CVE-2024-24923

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted Catia MODEL files in Simcenter Femap. Attackers can exploit an out-of-bounds read vulnerability to execute arbitrary code in the context of the current process. All users of Simcenter Femap versions before V2401.0000 and V2306.0001 are affected.

💻 Affected Systems

Products:
  • Simcenter Femap
Versions: All versions < V2401.0000 and all versions < V2306.0001
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when parsing Catia MODEL files, which is a core functionality of Femap.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the Femap process, potentially leading to data theft, system manipulation, or lateral movement.

🟠

Likely Case

Remote code execution leading to malware installation, data exfiltration, or system disruption when users open malicious Catia files.

🟢

If Mitigated

Limited impact with proper file validation and user awareness preventing malicious file execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious Catia file. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2401.0000 or V2306.0001

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-000072.html

Restart Required: Yes

Instructions:

1. Download the latest version from Siemens support portal. 2. Install the update following Siemens installation guide. 3. Restart the system after installation.

🔧 Temporary Workarounds

Restrict Catia file handling

windows

Block or restrict processing of Catia MODEL files through application controls or file policies.

User awareness training

all

Train users to only open Catia files from trusted sources and verify file integrity.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized Femap execution
  • Use network segmentation to isolate Femap systems from critical assets

🔍 How to Verify

Check if Vulnerable:

Check Femap version via Help > About menu. If version is below V2401.0000 or V2306.0001, system is vulnerable.

Check Version:

Not applicable - check via GUI Help > About menu

Verify Fix Applied:

Verify installed version is V2401.0000 or V2306.0001 or higher in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of femap.exe
  • Unusual file access patterns to Catia files

Network Indicators:

  • Unexpected outbound connections from Femap process

SIEM Query:

Process: femap.exe AND (EventID: 1000 OR EventID: 1001) OR FileAccess: *.CATPart OR *.CATProduct

🔗 References

📤 Share & Export