CVE-2024-23795

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through a specially crafted WRL file in Tecnomatix Plant Simulation. Attackers can execute arbitrary code in the context of the current process by exploiting an out-of-bounds write buffer overflow. Users of Tecnomatix Plant Simulation V2201 and V2302 before specific patch versions are affected.

💻 Affected Systems

Products:
  • Tecnomatix Plant Simulation V2201
  • Tecnomatix Plant Simulation V2302
Versions: V2201: All versions < V2201.0012, V2302: All versions < V2302.0006
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when parsing malicious WRL files, which are 3D model files used in manufacturing simulation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or remote code execution leading to unauthorized access to sensitive engineering data and disruption of manufacturing operations.

🟢

If Mitigated

Limited impact with proper network segmentation and file validation controls preventing malicious WRL files from reaching vulnerable systems.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious WRL file, but no authentication is needed once the file is processed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2201.0012 for V2201, V2302.0006 for V2302

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-017796.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Siemens support portal. 2. Close all Plant Simulation instances. 3. Run the patch installer. 4. Restart the system. 5. Verify the version is updated.

🔧 Temporary Workarounds

Restrict WRL file processing

windows

Block or restrict processing of WRL files through application controls or file type restrictions.

User awareness training

all

Train users not to open WRL files from untrusted sources.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized execution of Plant Simulation.
  • Use network segmentation to isolate Plant Simulation systems from critical infrastructure.

🔍 How to Verify

Check if Vulnerable:

Check Plant Simulation version in Help > About menu. If version is V2201 < 0012 or V2302 < 0006, system is vulnerable.

Check Version:

Not applicable - check via Plant Simulation GUI Help > About menu

Verify Fix Applied:

After patching, verify version shows V2201.0012 or V2302.0006 in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing WRL files
  • Unusual process creation from Plant Simulation

Network Indicators:

  • Unusual outbound connections from Plant Simulation systems

SIEM Query:

Process creation where parent_process contains 'PlantSimulation' AND (process_name contains 'cmd.exe' OR process_name contains 'powershell.exe')

🔗 References

📤 Share & Export