Multiple Vulnerabilities in SiemensSolid Edge Could Allow for Arbitrary Code Execution

ITS Advisory Number: 
2021-125
Date(s) Issued: 
Friday, October 1, 2021
Subject: 
Multiple Vulnerabilities in SiemensSolid Edge Could Allow for Arbitrary Code Execution
Overview: 

Multiple vulnerabilities have been discovered in SiemensSolid Edge, the most severe of which could allow an attacker to cause an arbitrary code execution. Siemens Edge is a portfolio of software tools that addresses various product development processes: 3D design, simulation, manufacturing and design management. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user, an attacker could then view or modify data, as well as take full control of the system.

 

THREAT INTELLIGENCE:

There are currently no reports of these vulnerabilities being exploited in the wild.

Systems Affected: 
  • Solid Edge SE2021: All versions prior to SE2021MP8
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
Medium
BUSINESS
Large and medium business entities: 
High
Small business entities: 
Medium
Home Users: 
Low
Description: 

Multiple vulnerabilities have been discovered in SiemensSolid Edge, the most severe of which could allow for arbitrary code execution in the context of the system.

Details of the vulnerabilities are as follows:

  • Application contains a use-after-free vulnerability that could cause arbitrary code execution. (CVE-2021-37202)
  • Application contains an out-of-bounds read while parsing user supplied IFC files which could result in a denial-of-service condition or reading of sensitive information from memory. (CVE-2021-37203)
  • Application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files which leads to information leak. (CVE-2021-41533, CVE-2021-41534)
  • Application contains a use-after-free vulnerability while parsing OBJ files which leads to arbitrary code execution. (CVE-2021-41535, CVE-2021-41536, CVE-2021-41537)
  • Application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files which leads to information leak. (CVE-2021-41538)
  • Application contains a use-after-free vulnerability while parsing OBJ files which leads to arbitrary code execution. (CVE-2021-41539, CVE-2021-41540)

Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the system. Depending on the privileges associated with the user, an attacker could then view or modify data, as well as take full control of the system.

Actions: 
  • After appropriate testing, immediately install the updates provided by Simens.
  • Verify that all hosts with a public IP do not have open ports unless absolutely necessary.
  • Apply the Principle of Least Privilege to all systems and services.
  • Avoid opening files from unknown sources in Solid Edge.