CVE-2024-47942

7.3 HIGH

📋 TL;DR

Solid Edge SE2024 versions before V224.0 Update 9 contain a DLL hijacking vulnerability that allows attackers to execute arbitrary code by placing a malicious DLL file on the system. This affects all users running vulnerable versions of Solid Edge SE2024.

💻 Affected Systems

Products:
  • Solid Edge SE2024
Versions: All versions < V224.0 Update 9
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to place DLL in specific location where Solid Edge searches for libraries.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Solid Edge user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive engineering data, intellectual property theft, or system disruption.

🟢

If Mitigated

Limited impact with proper application whitelisting and user privilege restrictions in place.

🌐 Internet-Facing: LOW - This requires local access or ability to place files on the target system.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking is a well-known attack vector with established techniques, though specific exploitation details for this vulnerability are not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V224.0 Update 9

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-351178.html

Restart Required: Yes

Instructions:

1. Download Solid Edge SE2024 V224.0 Update 9 from Siemens support portal. 2. Install the update following Siemens installation procedures. 3. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Application Whitelisting

windows

Implement application control policies to prevent execution of unauthorized DLLs.

Restrict DLL Search Path

windows

Use Windows policies to restrict DLL search paths for Solid Edge.

🧯 If You Can't Patch

  • Implement strict file system permissions to prevent unauthorized users from writing DLLs to Solid Edge directories.
  • Run Solid Edge with minimal user privileges and implement principle of least privilege across the environment.

🔍 How to Verify

Check if Vulnerable:

Check Solid Edge version in Help > About Solid Edge. If version is earlier than V224.0 Update 9, the system is vulnerable.

Check Version:

Not applicable - check via Solid Edge GUI Help > About menu.

Verify Fix Applied:

Verify Solid Edge version shows V224.0 Update 9 or later in Help > About Solid Edge.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • Process Monitor logs showing Solid Edge loading unexpected DLLs

Network Indicators:

  • Unusual outbound connections from Solid Edge process

SIEM Query:

Process creation where parent process contains 'solidedge' AND command line contains 'rundll32' OR file creation in Solid Edge installation directories

🔗 References

📤 Share & Export