PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-44412 Cert Portal CVE debrief

CVE-2026-44412 is a high-severity memory corruption issue in Siemens Solid Edge affecting versions earlier than V226.0 Update 5. A specially crafted PAR file can trigger a stack-based overflow and may lead to code execution in the context of the current process.

Vendor
Cert Portal
Product
Siemens Solid Edge vers:intdot/<226.0.5
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-12
Original CVE updated
2026-05-14
Advisory published
2026-05-12
Advisory updated
2026-05-14

Who should care

Administrators and users of Siemens Solid Edge, especially in engineering and industrial environments that routinely open PAR files or exchange them with external parties.

Technical summary

The advisory describes a stack-based overflow in the PAR file parser. The published CVSS v3.1 vector is AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, reflecting local attack conditions, required user interaction, and potential impact to confidentiality, integrity, and availability. Siemens lists V226.0 Update 5 or later as the fix.

Defensive priority

High

Recommended defensive actions

  • Update Siemens Solid Edge to V226.0 Update 5 or later.
  • Treat PAR files from untrusted or unverifiable sources as hazardous until the fix is applied.
  • Apply CISA and vendor-recommended industrial control and defense-in-depth practices to reduce exposure around engineering file workflows.
  • Prioritize patching on systems that regularly process externally supplied PAR files or that support higher-risk engineering workflows.

Evidence notes

The supplied CISA CSAF advisory for ICSA-26-134-03 states that affected applications contain a stack-based overflow while parsing specially crafted PAR files and that this could allow code execution in the context of the current process. The remediation entry specifies updating to V226.0 Update 5 or later. The CVSS vector in the source is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H with a score of 7.8. Timeline context: the advisory was published on 2026-05-12, received a title correction on 2026-05-13, and was republished on 2026-05-14 using the Siemens ProductCERT advisory.

Official resources

CISA published the advisory on 2026-05-12 and modified it on 2026-05-14. The source revision history notes a title correction on 2026-05-13 and republishing based on the Siemens ProductCERT advisory. This debrief uses only the supplied CISA