CVE-2025-40744

7.5 HIGH

📋 TL;DR

This vulnerability in Solid Edge SE2025 allows unauthenticated remote attackers to perform man-in-the-middle attacks by exploiting improper client certificate validation when connecting to the License Service endpoint. All versions before V225.0 Update 11 are affected, potentially compromising license management and software integrity.

💻 Affected Systems

Products:
  • Solid Edge SE2025
Versions: All versions < V225.0 Update 11
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the License Service endpoint communication; requires network access to the license service.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept and manipulate license communications, potentially enabling unauthorized software access, license theft, or injection of malicious code into the licensing process.

🟠

Likely Case

Attackers could perform man-in-the-middle attacks to eavesdrop on license communications, potentially stealing license information or disrupting legitimate license validation.

🟢

If Mitigated

With proper network segmentation and certificate validation controls, the attack surface is reduced, limiting potential impact to isolated license management systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires man-in-the-middle positioning and understanding of the license protocol.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V225.0 Update 11

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-522291.html

Restart Required: Yes

Instructions:

1. Download Solid Edge SE2025 V225.0 Update 11 from Siemens support portal. 2. Install the update following Siemens installation guidelines. 3. Restart affected systems and verify license service functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate license service traffic to trusted networks only

Certificate Validation Enforcement

windows

Configure systems to require and validate client certificates for all license service communications

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to license service endpoints
  • Monitor network traffic to/from license service for unusual patterns or unauthorized connections

🔍 How to Verify

Check if Vulnerable:

Check Solid Edge version in Help > About; if version is earlier than V225.0 Update 11, the system is vulnerable.

Check Version:

In Solid Edge: Help > About

Verify Fix Applied:

Verify version shows V225.0 Update 11 or later in Help > About, and test license service connectivity with proper certificate validation.

📡 Detection & Monitoring

Log Indicators:

  • Failed certificate validation attempts
  • Unusual license service connection patterns
  • License service authentication errors

Network Indicators:

  • Unencrypted or improperly authenticated license service traffic
  • MITM attack patterns in license service communications

SIEM Query:

source="solid-edge" AND (event_type="license_failure" OR certificate_validation="failed")

🔗 References

📤 Share & Export