CVE-2024-32061

7.8 HIGH

📋 TL;DR

This vulnerability in Simcenter Femap allows attackers to execute arbitrary code by exploiting an out-of-bounds read when parsing malicious IGS files. Users of Simcenter Femap versions before V2406 are affected, potentially enabling remote code execution in the context of the current process.

💻 Affected Systems

Products:
  • Simcenter Femap
Versions: All versions < V2406
Operating Systems: Windows (primary platform for Femap)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default installations when processing IGS files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, allowing attacker to install malware, exfiltrate data, or pivot to other systems.

🟠

Likely Case

Local privilege escalation or application crash leading to denial of service, with potential for limited code execution.

🟢

If Mitigated

Application crash without code execution if exploit fails or is blocked by security controls.

🌐 Internet-Facing: LOW (requires user interaction to open malicious file, not typically internet-exposed)
🏢 Internal Only: MEDIUM (internal users could be tricked into opening malicious files via phishing or shared drives)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious IGS file. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2406

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-064222.html

Restart Required: Yes

Instructions:

1. Download Simcenter Femap V2406 or later from Siemens support portal. 2. Install the update following Siemens installation procedures. 3. Restart the application and any related services.

🔧 Temporary Workarounds

Restrict IGS file processing

windows

Block or restrict processing of IGS files through application settings or group policies

User awareness training

all

Train users not to open IGS files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use network segmentation to isolate Femap systems from critical assets

🔍 How to Verify

Check if Vulnerable:

Check Femap version via Help > About in the application interface

Check Version:

Not applicable - check via GUI only

Verify Fix Applied:

Verify version is V2406 or later in Help > About dialog

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing IGS files
  • Unexpected process creation from Femap

Network Indicators:

  • Unusual outbound connections from Femap process

SIEM Query:

Process creation events from femap.exe followed by suspicious network activity

🔗 References

📤 Share & Export