CVE-2023-49125

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by exploiting an out-of-bounds read in Parasolid and Solid Edge when processing malicious XT files. Affected users include those running vulnerable versions of Siemens Parasolid V35.0, V35.1, V36.0, Solid Edge SE2023, and Solid Edge SE2024. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Parasolid V35.0
  • Parasolid V35.1
  • Parasolid V36.0
  • Solid Edge SE2023
  • Solid Edge SE2024
Versions: Parasolid V35.0 < V35.0.263, Parasolid V35.1 < V35.1.252, Parasolid V36.0 < V36.0.198, Solid Edge SE2023 < V223.0 Update 11, Solid Edge SE2024 < V224.0 Update 3
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with default configurations are vulnerable when processing XT files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Application crash (denial of service) or limited code execution within the current process context, potentially leading to data exfiltration.

🟢

If Mitigated

Application crash with no further impact if proper sandboxing and privilege separation are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious XT file, but no authentication is needed once the file is processed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Parasolid V35.0.263, V35.1.252, V36.0.198, Solid Edge SE2023 V223.0 Update 11, Solid Edge SE2024 V224.0 Update 3

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-382651.html

Restart Required: Yes

Instructions:

1. Download the latest patches from Siemens support portal. 2. Apply patches to affected systems. 3. Restart applications/services. 4. Verify patch installation.

🔧 Temporary Workarounds

Restrict XT file processing

all

Block or restrict processing of XT files through application settings or system policies.

User awareness training

all

Educate users to avoid opening untrusted XT files from unknown sources.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code.
  • Deploy endpoint detection and response (EDR) solutions to monitor for exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check installed version against affected version ranges in application about dialog or system information.

Check Version:

Check application Help > About or use system-specific version query commands.

Verify Fix Applied:

Verify version number matches or exceeds patched versions: Parasolid V35.0.263+, V35.1.252+, V36.0.198+, Solid Edge SE2023 V223.0 Update 11+, Solid Edge SE2024 V224.0 Update 3+.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing XT files
  • Unexpected process creation from Parasolid/Solid Edge

Network Indicators:

  • Outbound connections from CAD applications to unexpected destinations

SIEM Query:

Process creation events from parasolid.exe or sldedge.exe followed by suspicious network activity

🔗 References

📤 Share & Export