CVE-2025-40936

7.8 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in the PS/IGES Parasolid Translator Component allows attackers to crash applications or execute arbitrary code by providing specially crafted IGS files. This affects all versions before V29.0.258 of Siemens' Parasolid-based software. Users of affected Siemens CAD/CAM/CAE applications are at risk.

💻 Affected Systems

Products:
  • Siemens Parasolid-based CAD/CAM/CAE applications using PS/IGES translator
Versions: All versions < V29.0.258
Operating Systems: Windows, Linux, macOS (where supported)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any application using the vulnerable Parasolid translator component to process IGS/IGES files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crashes causing denial of service and potential data loss in engineering workflows.

🟢

If Mitigated

Limited impact with proper file validation and restricted user privileges.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files but could be delivered via web interfaces.
🏢 Internal Only: HIGH - Engineering workstations often process untrusted IGS files from external sources.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user to open malicious IGS file. No public exploit available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V29.0.258 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-241605.html

Restart Required: Yes

Instructions:

1. Identify affected Siemens software installations. 2. Download and install update V29.0.258 or later from Siemens support portal. 3. Restart affected applications and systems. 4. Verify patch installation.

🔧 Temporary Workarounds

Restrict IGS file processing

all

Block or sandbox processing of IGS/IGES files from untrusted sources

Application hardening

windows

Run affected applications with minimal privileges and enable DEP/ASLR

🧯 If You Can't Patch

  • Implement strict file validation for IGS/IGES files before processing
  • Isolate engineering workstations and restrict network access

🔍 How to Verify

Check if Vulnerable:

Check software version in application about dialog or installation details

Check Version:

Application-specific (check Help > About or installation properties)

Verify Fix Applied:

Confirm version is V29.0.258 or later and test with known safe IGS files

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing IGS files
  • Memory access violation errors in application logs

Network Indicators:

  • Unexpected IGS file transfers to engineering systems

SIEM Query:

source="application_logs" AND ("access violation" OR "out of bounds" OR "IGS" AND "crash")

🔗 References

📤 Share & Export