CVE-2024-47046

7.8 HIGH

📋 TL;DR

A memory corruption vulnerability in Simcenter Femap allows attackers to execute arbitrary code by tricking users into opening malicious BDF files. This affects all versions of Simcenter Femap V2306, V2401, and V2406. Users who process untrusted BDF files are at risk.

💻 Affected Systems

Products:
  • Simcenter Femap
Versions: V2306 (All versions), V2401 (All versions), V2406 (All versions)
Operating Systems: Windows (primary platform for Femap)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable when processing BDF files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Femap process, potentially leading to data theft, lateral movement, or persistence.

🟠

Likely Case

Local privilege escalation or arbitrary code execution when a user opens a malicious BDF file, potentially leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact if proper file validation and user awareness prevent malicious file execution.

🌐 Internet-Facing: LOW (Femap is typically not internet-facing, though malicious files could be delivered via web or email).
🏢 Internal Only: HIGH (Internal users processing untrusted BDF files could be exploited, especially in engineering environments).

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious file). No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version as per Siemens advisories

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-852501.html

Restart Required: Yes

Instructions:

1. Check current Femap version. 2. Download and install the latest update from Siemens support portal. 3. Restart the application and system as required.

🔧 Temporary Workarounds

Restrict BDF file handling

all

Limit processing of BDF files to trusted sources only and implement file validation.

User awareness training

all

Train users to avoid opening BDF files from untrusted sources.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code.
  • Use least privilege principles for Femap users and isolate engineering workstations.

🔍 How to Verify

Check if Vulnerable:

Check Femap version via Help > About in the application. If version is V2306, V2401, or V2406, it is vulnerable.

Check Version:

In Femap: Help > About displays version information.

Verify Fix Applied:

Verify version is updated beyond affected ranges and test with known safe BDF files.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes of Femap when processing files
  • Unusual process creation from Femap executable

Network Indicators:

  • Outbound connections from Femap process to unknown IPs post-file opening

SIEM Query:

Process creation where parent process is femap.exe and command line contains suspicious parameters

🔗 References

📤 Share & Export