CVE-2024-54091

7.8 HIGH

📋 TL;DR

This vulnerability in Solid Edge allows attackers to execute arbitrary code by exploiting an out-of-bounds write buffer overflow when parsing malicious X_T files. It affects Solid Edge SE2024 and SE2025 users running vulnerable versions. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Solid Edge SE2024
  • Solid Edge SE2025
Versions: Solid Edge SE2024: All versions < V224.0 Update 12; Solid Edge SE2025: All versions < V225.0 Update 3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default installations when processing X_T files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Solid Edge process, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or remote code execution when users open malicious X_T files, leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact with proper file validation and user education preventing malicious file execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious X_T files. No public exploits available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Solid Edge SE2024: V224.0 Update 12 or later; Solid Edge SE2025: V225.0 Update 3 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-672923.html

Restart Required: Yes

Instructions:

1. Download the latest update from Siemens support portal. 2. Close all Solid Edge applications. 3. Run the update installer. 4. Restart the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Block X_T file execution

windows

Prevent Solid Edge from opening X_T files by modifying file associations or using application control policies.

User education and file validation

all

Train users to only open X_T files from trusted sources and implement file validation procedures.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized Solid Edge processes.
  • Use network segmentation to isolate Solid Edge workstations from critical systems.

🔍 How to Verify

Check if Vulnerable:

Check Solid Edge version in Help > About Solid Edge. If version is below V224.0 Update 12 (SE2024) or V225.0 Update 3 (SE2025), the system is vulnerable.

Check Version:

Not applicable - check via Solid Edge GUI Help > About menu.

Verify Fix Applied:

Verify the version in Help > About Solid Edge matches or exceeds the patched versions.

📡 Detection & Monitoring

Log Indicators:

  • Solid Edge crash logs with memory access violations
  • Unexpected process creation from Solid Edge

Network Indicators:

  • Outbound connections from Solid Edge to unknown IPs
  • Unusual file transfers from Solid Edge workstations

SIEM Query:

Process creation where parent process contains 'solidedge' AND (command line contains '.x_t' OR file path contains '.x_t')

🔗 References

📤 Share & Export