CVE-2026-22923

7.8 HIGH

📋 TL;DR

A data validation vulnerability in NX software versions before V2512 allows local attackers to manipulate internal data during PDF export, potentially leading to arbitrary code execution. This affects all NX users with vulnerable versions installed. Attackers require local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • NX
Versions: All versions < V2512
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default installations when PDF export functionality is available.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full system control through arbitrary code execution, potentially compromising the entire system and accessing sensitive data.

🟠

Likely Case

Local attacker disrupts PDF export functionality, causes application crashes, or achieves limited code execution within the application context.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to denial of service for PDF export functionality.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly exploitable over network.
🏢 Internal Only: HIGH - Local access requirement makes this a significant insider threat or lateral movement risk in compromised environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of PDF export process manipulation. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2512 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-535115.html

Restart Required: Yes

Instructions:

1. Download NX V2512 or later from Siemens support portal. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the system. 5. Verify successful installation.

🔧 Temporary Workarounds

Disable PDF Export

all

Remove or restrict access to PDF export functionality to prevent exploitation.

# Configuration dependent - consult NX documentation for disabling PDF export

Restrict Local Access

all

Implement strict access controls to limit who can run NX applications locally.

# Use OS-level access controls (Windows GPO, Linux permissions)

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for NX users
  • Monitor for unusual PDF export activities and application crashes

🔍 How to Verify

Check if Vulnerable:

Check NX version via Help > About in application interface or check installed version in system.

Check Version:

# Windows: Check installed programs list
# Linux: Check package manager or installation directory

Verify Fix Applied:

Verify version is V2512 or later and test PDF export functionality works normally.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed PDF export attempts
  • Application crashes during PDF export
  • Unusual process spawning from NX

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName contains 'nx' AND Message contains 'pdf' OR 'export'

🔗 References

📤 Share & Export