PatchSiren cyber security CVE debrief
CVE-2024-54091 Siemens CVE debrief
CVE-2024-54091 is a high-severity memory-corruption issue in Siemens Solid Edge affecting SE2024 and SE2025. According to the CISA CSAF advisory and Siemens security advisory, the flaw is an out-of-bounds write past the end of an allocated buffer while parsing X_T data or a specially crafted X_T file. A successful attack could allow code execution in the context of the current process. Siemens published fixes for SE2024 and SE2025, and CISA lists the advisory as a local, user-interaction-requiring issue with high confidentiality, integrity, and availability impact.
- Vendor
- Siemens
- Product
- Solid Edge SE2024
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-08
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-08
- Advisory updated
- 2025-05-06
Who should care
Organizations using Siemens Solid Edge SE2024 or SE2025, especially CAD/engineering teams, desktop administrators, and users who routinely import or open X_T files from outside trusted sources.
Technical summary
The advisory describes a parser memory-safety flaw triggered during X_T file handling. The CVSS vector is AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating local access and user interaction are required, but no privileges are needed. The impact is code execution in the current process if a crafted file is processed. Siemens lists remediation for Solid Edge SE2024 and SE2025 via vendor updates, and CISA also recommends not opening untrusted X_T files or providing untrusted X_T data to affected applications.
Defensive priority
High. The issue is rated 7.8 High and can lead to code execution, but it requires user interaction with a crafted file and is not listed in CISA KEV in the supplied sources.
Recommended defensive actions
- Update Siemens Solid Edge SE2024 to V224.0 Update 12 or later.
- Update Siemens Solid Edge SE2025 to V225.0 Update 3 or later.
- Do not open untrusted X_T files or feed untrusted X_T data into affected applications.
- Apply CISA recommended ICS defensive practices for file handling, segmentation, and least-privilege workstation use.
- Prioritize awareness for engineering users who exchange CAD files with external parties.
Evidence notes
This debrief is based on the supplied CISA CSAF source item for ICSA-25-100-03 and the linked Siemens advisory references. The source states the affected products are Solid Edge SE2024 and SE2025, the flaw is an out-of-bounds write during X_T parsing, and the remediation versions are V224.0 Update 12 and V225.0 Update 3 respectively. The advisory was published on 2025-04-08 and later revised on 2025-05-06 for typo fixes only. No KEV entry or active ransomware linkage is provided in the supplied corpus.
Official resources
-
CVE-2024-54091 CVE record
CVE.org
-
CVE-2024-54091 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Published by CISA on 2025-04-08. The supplied source record was revised on 2025-05-06 for typo fixes only; that date is not the issue date.