CVE-2023-43625

9.8 CRITICAL

📋 TL;DR

CVE-2023-43625 is a critical remote code execution vulnerability in Simcenter Amesim's SOAP endpoint. Unauthenticated remote attackers can perform DLL injection to execute arbitrary code with the application's privileges. All Simcenter Amesim versions before V2021.1 are affected.

💻 Affected Systems

Products:
  • Simcenter Amesim
Versions: All versions < V2021.1
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable SOAP endpoint is typically enabled by default in standard installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal data, pivot to other systems, or disrupt industrial operations.

🟠

Likely Case

Ransomware deployment, data exfiltration, or establishing persistent backdoors in industrial environments.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and proper endpoint protection is in place.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-exposed systems immediate targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows lateral movement and privilege escalation within networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has a straightforward exploitation path via DLL injection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2021.1 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-386812.pdf

Restart Required: Yes

Instructions:

1. Download Simcenter Amesim V2021.1 or later from Siemens support portal. 2. Backup current configuration and data. 3. Install the updated version following Siemens installation guide. 4. Restart the system and verify the new version is running.

🔧 Temporary Workarounds

Network Segmentation

all

Block external access to Simcenter Amesim SOAP endpoints using firewall rules.

netsh advfirewall firewall add rule name="Block Amesim SOAP" dir=in action=block protocol=TCP localport=8080
iptables -A INPUT -p tcp --dport 8080 -j DROP

Application Whitelisting

windows

Restrict DLL loading to prevent unauthorized DLL injection.

Configure Windows AppLocker or equivalent to only allow signed DLLs from trusted publishers

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Simcenter Amesim systems from untrusted networks
  • Deploy endpoint detection and response (EDR) solutions to monitor for DLL injection attempts

🔍 How to Verify

Check if Vulnerable:

Check Simcenter Amesim version via Help > About in the application interface or examine installation directory version files.

Check Version:

On Windows: Check registry at HKEY_LOCAL_MACHINE\SOFTWARE\Siemens\Simcenter Amesim\Version. On Linux: Check /opt/siemens/simcenter_amesim/version.txt

Verify Fix Applied:

Confirm version is V2021.1 or later and test SOAP endpoint functionality with security scanning tools.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DLL loading events in Windows Event Logs
  • Failed authentication attempts to SOAP endpoints
  • Process creation from Simcenter Amesim with unusual command lines

Network Indicators:

  • Unusual SOAP requests to Simcenter Amesim ports
  • External IP addresses accessing internal Amesim services
  • Unexpected outbound connections from Amesim processes

SIEM Query:

source="windows" EventID=7 OR EventID=11 process_name="*amesim*" OR parent_process="*amesim*"

🔗 References

📤 Share & Export