CVE-2025-25175

7.8 HIGH

📋 TL;DR

A memory corruption vulnerability in Simcenter Femap allows attackers to execute arbitrary code by tricking users into opening malicious .NEU files. This affects all versions of Simcenter Femap V2401 before V2401.0003 and V2406 before V2406.0002. Users who open untrusted .NEU files are at risk.

💻 Affected Systems

Products:
  • Simcenter Femap V2401
  • Simcenter Femap V2406
Versions: All versions < V2401.0003 for V2401, All versions < V2406.0002 for V2406
Operating Systems: Windows (primary platform for Femap)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation when parsing .NEU files. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the Femap user, potentially leading to data theft, lateral movement, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or malware execution when users open malicious engineering files from untrusted sources.

🟢

If Mitigated

Limited impact if users only open trusted files and proper application sandboxing is in place.

🌐 Internet-Facing: LOW - This requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be tricked via phishing or shared drives into opening malicious files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious file. No authentication bypass needed but requires social engineering or file placement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2401.0003 for V2401, V2406.0002 for V2406

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-920092.html

Restart Required: No

Instructions:

1. Download the appropriate patch from Siemens support portal. 2. Run the installer as administrator. 3. Follow on-screen instructions. 4. Verify installation by checking version in Femap Help > About.

🔧 Temporary Workarounds

Restrict .NEU file handling

all

Block or restrict opening of .NEU files from untrusted sources using application control policies.

User awareness training

all

Train users to only open .NEU files from trusted sources and verify file integrity.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Run Femap with reduced privileges using standard user accounts (not administrator)

🔍 How to Verify

Check if Vulnerable:

Check Femap version in Help > About menu. If version is V2401 below 0003 or V2406 below 0002, system is vulnerable.

Check Version:

Not applicable - check via GUI in Help > About menu

Verify Fix Applied:

Verify version shows V2401.0003 or higher for V2401, or V2406.0002 or higher for V2406 in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes of Femap.exe
  • Creation of suspicious child processes from Femap
  • Unusual file access patterns from Femap process

Network Indicators:

  • Outbound connections from Femap to unusual destinations
  • DNS requests for command and control domains from Femap process

SIEM Query:

Process Creation where Image contains 'femap.exe' and CommandLine contains '.neu' OR ParentImage contains 'femap.exe' and Image not in (expected_child_processes)

🔗 References

📤 Share & Export