CVE-2025-40762

7.8 HIGH

📋 TL;DR

An out-of-bounds write vulnerability in Simcenter Femap allows remote code execution when parsing malicious STP files. Attackers can execute arbitrary code within the current process context. All users of Simcenter Femap V2406 before V2406.0003 and V2412 before V2412.0002 are affected.

💻 Affected Systems

Products:
  • Simcenter Femap V2406
  • Simcenter Femap V2412
Versions: V2406 versions < V2406.0003, V2412 versions < V2412.0002
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing STP files, which is a core functionality of this engineering simulation software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or arbitrary code execution when users open malicious STP files, potentially leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact if proper file validation and user awareness prevent malicious file execution, though risk remains for legitimate file processing.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious STP files. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2406.0003 for V2406, V2412.0002 for V2412

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-674084.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Siemens support portal. 2. Close all Femap instances. 3. Run the installer with administrative privileges. 4. Restart the system to complete installation.

🔧 Temporary Workarounds

Restrict STP file processing

all

Block or restrict processing of STP files from untrusted sources

User awareness training

all

Train users to only open STP files from trusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use network segmentation to isolate Femap systems from critical assets

🔍 How to Verify

Check if Vulnerable:

Check Femap version via Help > About menu. If version is V2406 < 0003 or V2412 < 0002, system is vulnerable.

Check Version:

Not applicable - check via GUI Help > About menu

Verify Fix Applied:

Verify version shows V2406.0003 or V2412.0002 in Help > About menu after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes when opening STP files
  • Suspicious child processes spawned from Femap

Network Indicators:

  • Unexpected outbound connections from Femap process

SIEM Query:

Process creation where parent process contains 'femap' AND (command line contains '.stp' OR file extension is '.stp')

🔗 References

📤 Share & Export