CVE Alert: CVE-2025-40811 – Siemens – Solid Edge SE2024
CVE-2025-40811
A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 14), Solid Edge SE2025 (All versions < V225.0 Update 6). The affected applications contains an out of bounds read vulnerability while parsing specially crafted PRT files. This could allow an attacker to crash the application or execute code in the context of the current process.
AI Summary Analysis
Risk verdict
High risk overall; there is no current exploitation flag (SSVC exploitation state: none) and no KEV entry, but the potential for code execution with user interaction warrants urgent remediation.
Why this matters
Engineering and manufacturing environments relying on Solid Edge CAD are exposed if users open crafted PRT files. A successful trigger could compromise the running process, risking CAD data integrity and potential broader impact if credentials or network access are leveraged post-exploitation.
Most likely attack path
An attacker would need local access and a user to open a malicious PRT file. Parsing this file could trigger an out-of-bounds read, causing a crash or code execution within the process and potentially enabling local privilege escalation or data compromise, depending on the user’s rights.
Who is most exposed
Sites with widespread Solid Edge deployments, particularly in design, engineering, and manufacturing offices, where sharing CAD files and external attachments is routine, are most at risk.
Detection ideas
- Crashes or memory corruption in Solid Edge after opening a PRT file.
- Abnormal crash dumps with parsing-related VMs or stack traces.
- Logs showing failed PRT parsing or anomalous file-handling events.
- Suspicious email or file-sharing activity involving PRT attachments.
- Unusual process memory growth around Solid Edge during file import.
Mitigation and prioritisation
- Apply the latest updates: SE2024 V224.0 Update 14 or SE2025 V225.0 Update 6.
- Restrict opening of external PRT files; enable whitelisting or sandboxing for CAD workflows.
- Enforce least privilege for Solid Edge users; consider separate CAD workstations.
- Enable application hardening, memory protection, and regular backups; verify patch deployment in staging first.
- If patching lags, implement compensating controls and conduct user awareness on handling external CAD files.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.