CVE-2024-54094

7.8 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in Solid Edge SE2024 allows attackers to execute arbitrary code by tricking users into opening malicious PAR files. This affects all versions before V224.0 Update 5. Users who open untrusted PAR files are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Solid Edge SE2024
Versions: All versions < V224.0 Update 5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when parsing PAR files, which are Solid Edge part files. The application must be installed and used to open files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/administrator privileges leading to full system compromise, data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attackers send spear-phishing emails with malicious PAR attachments, tricking users into opening them and gaining code execution on their workstations.

🟢

If Mitigated

With proper controls, impact is limited to the Solid Edge process crashing or denial of service for the application.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious file. No public exploit code is available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V224.0 Update 5

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-730188.html

Restart Required: Yes

Instructions:

1. Download Solid Edge SE2024 V224.0 Update 5 from Siemens support portal. 2. Close all Solid Edge applications. 3. Run the update installer with administrative privileges. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Block PAR file extensions

windows

Prevent Solid Edge from opening PAR files via group policy or application control.

Using Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: Path: *.par, Security Level: Disallowed

Disable PAR file association

windows

Remove PAR file type association with Solid Edge in Windows.

Open Command Prompt as administrator and run: assoc .par=
Then run: ftype SolidEdge.Part=

🧯 If You Can't Patch

  • Implement application whitelisting to block execution of Solid Edge from untrusted locations.
  • Deploy email filtering to block PAR attachments and user training to avoid opening untrusted files.

🔍 How to Verify

Check if Vulnerable:

Open Solid Edge, go to Help > About Solid Edge. Check if version is earlier than V224.0 Update 5.

Check Version:

wmic product where "name like 'Solid Edge%'" get version

Verify Fix Applied:

After patching, verify version shows V224.0 Update 5 or later in Help > About Solid Edge.

📡 Detection & Monitoring

Log Indicators:

  • Solid Edge crash logs with exception codes like 0xC0000005 (ACCESS_VIOLATION)
  • Windows Application logs with Faulting Module: Solid Edge executable

Network Indicators:

  • Unusual outbound connections from Solid Edge process
  • File downloads of PAR files from untrusted sources

SIEM Query:

source="windows" AND (event_id=1000 OR event_id=1001) AND process_name="*Solid Edge*" AND exception_code="0xC0000005"

🔗 References

📤 Share & Export