Rewterz
Rewterz Threat Advisory – ICS: Siemens COMOS Vulnerability
February 16, 2023
Rewterz
Rewterz Threat Advisory – ICS: Siemens TIA Multiuser Server and Siemens TIA Project-Server Vulnerability
February 16, 2023

Rewterz Threat Advisory – ICS: Multiple Siemens Solid Edge Vulnerabilities

Severity

High

Analysis Summary

CVE-2023-24549 CVSS:7.8

Siemens Solid Edge is vulnerable to a heap-based buffer overflow, caused by improper bounds checking. By persuading a victim to open a specially-crafted PAR file, a remote attacker could overflow a buffer and execute arbitrary code in the context of the current process.

CVE-2023-24550 CVSS:7.8

Siemens Solid Edge is vulnerable to a heap-based buffer overflow, caused by improper bounds checking. By persuading a victim to open a specially-crafted PAR file, a remote attacker could overflow a buffer and execute arbitrary code in the context of the current process.

CVE-2023-24551 CVSS:7.8

Siemens Solid Edge is vulnerable to a heap-based buffer overflow, caused by improper bounds checking. By persuading a victim to open a specially-crafted PAR file, a remote attacker could overflow a buffer and execute arbitrary code in the context of the current process.

CVE-2023-24552 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds read. By persuading a victim to open a specially-crafted PAR file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24553 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds read. By persuading a victim to open a specially-crafted PAR file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24554 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds read. By persuading a victim to open a specially-crafted PAR file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24555 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds read. By persuading a victim to open a specially-crafted PAR file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24556 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds read. By persuading a victim to open a specially-crafted PAR file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24557 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds read. By persuading a victim to open a specially-crafted PAR file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24558 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds read. By persuading a victim to open a specially-crafted PAR file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24559 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds read. By persuading a victim to open a specially-crafted PAR file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24560 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write. By persuading a victim to open a specially-crafted PAR file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24561 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by uninitialized pointer access. By persuading a victim to open a specially-crafted PAR file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24562 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by uninitialized pointer access. By persuading a victim to open a specially-crafted PAR file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24563 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by uninitialized pointer access. By persuading a victim to open a specially-crafted PAR file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24564 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by memory corruption. By persuading a victim to open a specially-crafted DWG file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-24565 CVSS:3.3

Siemens Solid Edge could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read. By persuading a victim to open a specially-crafted STL file, an attacker could exploit this vulnerability to obtain sensitive information and use this information to launch further attacks against the affected system.

CVE-2023-24566 CVSS:3.3

Siemens Solid Edge is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. By persuading a victim to open a specially-crafted PAR file, a remote attacker could overflow a buffer and execute arbitrary code in the context of the current process.

CVE-2023-24581 CVSS:7.8

Siemens Solid Edge could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free. By persuading a victim to open a specially-crafted STP file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current process.

Impact

  • Code Execution
  • Information Disclosure
  • Buffer Overflow

Indicators Of Compromise

CVE

  • CVE-2023-24549
  • CVE-2023-24550
  • CVE-2023-24551
  • CVE-2023-24552
  • CVE-2023-24553
  • CVE-2023-24554
  • CVE-2023-24555
  • CVE-2023-24556
  • CVE-2023-24557
  • CVE-2023-24558
  • CVE-2023-24559
  • CVE-2023-24560
  • CVE-2023-24561
  • CVE-2023-24562
  • CVE-2023-24563
  • CVE-2023-24564
  • CVE-2023-24565
  • CVE-2023-24566
  • CVE-2023-24581

Affected Vendors

Siemens

Affected Products

  • Siemens Solid Edge SE2022 2210Update12
  • Siemens Solid Edge SE2023Update1
  • Siemens Solid Edge SE2022

Remediation

Refer to Siemens Security Advisory for patch, upgrade or suggested workaround information.

Siemens Security Advisory