Siemens Simcenter Femap Vulnerabilities: Security Risks and Mitigations

  • Thread Author

What’s Behind the Warning?
Beginning January 10, 2023, CISA stated that it will stop updating Industrial Control System (ICS) security advisories specific to Siemens product vulnerabilities beyond the initial advisory. For ongoing updates, users are encouraged to consult Siemens' ProductCERT Security Advisories. This decision underscores a growing concern over the security implications tied to industrial software deployments.
At the heart of this advisory are two significant vulnerabilities identified in the Simcenter Femap package—a tool widely used in engineering simulation and analysis:
  1. Heap-Based Buffer Overflow (CWE-122)
  2. Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)
These vulnerabilities were rated with a Common Vulnerability Scoring System (CVSS) v4 score of 7.3, indicating a high-impact potential with relatively low attack complexity, which is alarming for users across critical manufacturing sectors globally.

Understanding the Vulnerabilities​

  1. Heap-Based Buffer Overflow: This vulnerability arises when the Femap application processes intentionally malformed BDF files. An attacker could exploit this weak point, leading to remote code execution in the context of the current process. With a CVSS v3 score of 7.8 and a corresponding CVE identifier (CVE-2024-41981), this issue represents a significant risk.
  2. Improper Memory Buffer Operations: Similar to the first, this vulnerability allows for memory corruption through the same parsing of malicious BDF files, again posing risks of code execution. It also carries a CVSS v3 score of 7.8, recognized under CVE-2024-47046.
In both cases, successful exploitation could result in attackers executing arbitrary code, effectively gaining control over the affected systems. The broad deployment of these products globally means the ramifications could be far-reaching.

Who’s Affected?​

The following versions of Siemens Simcenter Femap are confirmed as vulnerable:
  • Simcenter Femap V2306: All versions
  • Simcenter Femap V2401: All versions
  • Simcenter Femap V2406: All versions
Siemens has urged users to upgrade to the latest version of Simcenter Femap V2406, which should mitigate these vulnerabilities. However, users of versions V2306 and V2401 are left in a precarious position as no fixes are currently available.

Recommended Mitigations​

To reduce the risk of exploitation, Siemens advocates for several key strategies:
  • Avoid Opening Unknown Files: Users should refrain from opening untrusted BDF files—these are potential vehicles for attackers.
  • Network Protection: Securing network access using firewalls and isolating critical control system networks from business networks is crucial.
  • Deploy VPNs for Remote Access: When remote access is necessary, utilizing VPNs can help enhance security. However, users must remain vigilant as VPNs can also harbor vulnerabilities if not regularly updated.
Siemens has released updates that can be integrated into the latest version (Femap V2406), and they encourage reviewing their operational guidelines for industrial security thoroughly.
For further information, CISA has urged organizations to follow best practices in cybersecurity, including relevant threat mitigation strategies outlined in their publications.

Acting Now: The Importance of Vigilance​

Currently, there have been no reports of public exploitation of these vulnerabilities. Nevertheless, they are not remotely exploitable, which means local access or interaction is required for exploitation. This aspect somewhat mitigates the urgency, but organizations must not become complacent.
Performing an impact analysis and risk assessment before implementing any defensive measures is fundamental. As the history of cybersecurity has shown, remaining proactive rather than reactive is essential.

Conclusion​

The Siemens Simcenter Femap vulnerabilities highlight the importance of staying informed and vigilant in the face of cybersecurity threats. For Windows users in critical manufacturing and other sectors leveraging this software, now is the time to enhance protective measures. Relying solely on advisories or late responses isn't enough; active engagement and preemptive strategies will strengthen defenses against potential cyber threats.
Whether it’s updating software, adjusting network configurations, or simply adhering to best practices in cybersecurity, every action counts in maintaining the integrity of systems and safeguarding valuable data. Keep your systems secure, be aware of potential risks, and always look for the latest security updates.

Source: CISA Siemens Simcenter Femap