CVE-2026-23718

7.8 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in Simcenter Femap and Simcenter Nastran allows attackers to execute arbitrary code by tricking users into opening malicious NDB files. This affects all versions before V2512 of both engineering simulation software products. Users who process untrusted NDB files are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Simcenter Femap
  • Simcenter Nastran
Versions: All versions < V2512
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when parsing specially crafted NDB files; default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the current user, potentially leading to full system compromise, data theft, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or arbitrary code execution when a user opens a malicious NDB file, potentially leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact if proper file handling controls and user awareness prevent opening untrusted files, though the vulnerability remains present.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious file; no public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2512

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-965753.html

Restart Required: Yes

Instructions:

1. Download and install Simcenter Femap V2512 or Simcenter Nastran V2512 from Siemens support portal. 2. Follow vendor installation instructions. 3. Restart affected systems after installation.

🔧 Temporary Workarounds

Restrict NDB file handling

all

Implement application whitelisting to prevent execution of vulnerable versions or restrict opening of NDB files from untrusted sources.

User awareness training

all

Train users to avoid opening NDB files from unknown or untrusted sources.

🧯 If You Can't Patch

  • Implement strict file handling policies to block NDB files from untrusted sources.
  • Use network segmentation to isolate systems running vulnerable software from critical assets.

🔍 How to Verify

Check if Vulnerable:

Check software version in application Help > About menu; if version is below V2512, the system is vulnerable.

Check Version:

Not applicable; check via GUI in Help > About.

Verify Fix Applied:

Verify installed version is V2512 or higher in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or unexpected termination when processing NDB files
  • Unusual process creation from Simcenter applications

Network Indicators:

  • Unusual outbound connections from Simcenter processes

SIEM Query:

EventID=1000 OR EventID=1001 (Application Error) with process name containing 'femap' or 'nastran'

🔗 References

📤 Share & Export