CVE-2023-41032

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted X_T files in Parasolid and Simcenter Femap software. An attacker could execute arbitrary code in the context of the current process by exploiting an out-of-bounds write vulnerability. Users of affected Parasolid and Simcenter Femap versions are at risk.

💻 Affected Systems

Products:
  • Parasolid
  • Simcenter Femap
Versions: Parasolid V34.1 (< V34.1.258), V35.0 (< V35.0.253), V35.1 (< V35.1.184), V36.0 (< V36.0.142); Simcenter Femap V2301 (< V2301.0003), V2306 (< V2306.0001)
Operating Systems: Windows, Linux, macOS (where applicable)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable when processing X_T files. The vulnerability is in the file parsing component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the application process, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or remote code execution when processing malicious X_T files, potentially compromising engineering data and systems.

🟢

If Mitigated

Limited impact with proper file validation and least privilege controls, potentially only causing application crashes.

🌐 Internet-Facing: MEDIUM - Risk exists if applications process untrusted X_T files from external sources, but typically these are internal engineering tools.
🏢 Internal Only: HIGH - These CAD/CAM/CAE applications often process files from various sources within organizations, making internal exploitation vectors significant.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting a malicious X_T file that triggers the out-of-bounds write. No authentication is needed if the application processes the file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Parasolid V34.1.258, V35.0.253, V35.1.184, V36.0.142; Simcenter Femap V2301.0003, V2306.0001

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-190839.pdf

Restart Required: Yes

Instructions:

1. Download the latest version from Siemens or Bentley official sources. 2. Backup current installation and data. 3. Run the installer with administrative privileges. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict X_T file processing

all

Implement application control to block processing of untrusted X_T files or restrict file sources.

Run with reduced privileges

windows

Configure the application to run with limited user privileges to reduce impact of successful exploitation.

🧯 If You Can't Patch

  • Implement strict file validation: Only allow X_T files from trusted sources and scan all incoming files.
  • Network segmentation: Isolate systems running vulnerable software from critical networks and internet access.

🔍 How to Verify

Check if Vulnerable:

Check the installed version against affected version ranges in the application's about dialog or installation details.

Check Version:

Windows: Check 'Programs and Features' or application Help > About; Linux: Check package manager or application version command

Verify Fix Applied:

Verify the installed version matches or exceeds the patched versions listed in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing X_T files
  • Unexpected process creation from Parasolid/Femap processes
  • File parsing errors in application logs

Network Indicators:

  • Unusual outbound connections from engineering workstations
  • File transfers of X_T files from untrusted sources

SIEM Query:

Process creation where parent process contains 'parasolid' or 'femap' AND (command line contains '.x_t' OR file extension is '.x_t')

🔗 References

📤 Share & Export