CVE-2024-33491

7.8 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in Solid Edge allows attackers to execute arbitrary code by tricking users into opening malicious PAR files. This affects all Solid Edge versions before V224.0 Update 5. Users who open untrusted PAR files are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Solid Edge
Versions: All versions < V224.0 Update 5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when parsing PAR files, which are Solid Edge part files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Solid Edge process, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or remote code execution when users open malicious PAR files from untrusted sources.

🟢

If Mitigated

Limited impact if proper application whitelisting and user training prevent execution of untrusted files.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious PAR file. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V224.0 Update 5 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-589937.html

Restart Required: Yes

Instructions:

1. Download Solid Edge V224.0 Update 5 or later from Siemens support portal. 2. Install the update following Siemens installation guide. 3. Restart the system to complete installation.

🔧 Temporary Workarounds

Block PAR file extensions

windows

Prevent execution of PAR files via group policy or application control

Using Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: Path: *.par, Security Level: Disallowed

User awareness training

all

Train users to avoid opening PAR files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to block Solid Edge from executing untrusted PAR files
  • Use network segmentation to isolate Solid Edge workstations from critical systems

🔍 How to Verify

Check if Vulnerable:

Check Solid Edge version via Help > About Solid Edge. If version is below V224.0 Update 5, system is vulnerable.

Check Version:

In Solid Edge: Help > About Solid Edge

Verify Fix Applied:

Verify Solid Edge version is V224.0 Update 5 or later in Help > About Solid Edge.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Application crashes of sedraw.exe or related Solid Edge processes
  • Unexpected PAR file access from network shares or email attachments

Network Indicators:

  • Unusual outbound connections from Solid Edge workstations
  • PAR file downloads from untrusted sources

SIEM Query:

source="windows" event_id=1000 process_name="sedraw.exe" OR process_name="SolidEdge.exe"

🔗 References

📤 Share & Export