PatchSiren cyber security CVE debrief
CVE-2026-22923 Siemens CVE debrief
CVE-2026-22923 is a high-severity Siemens NX issue in the PDF export path. CISA’s advisory, republished from Siemens ProductCERT SSA-535115, says a local attacker with privileged access to NX running in managed mode could interfere with internal data during export and potentially cause arbitrary code execution.
- Vendor
- Siemens
- Product
- NX
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-02-10
- Original CVE updated
- 2026-03-12
- Advisory published
- 2026-02-10
- Advisory updated
- 2026-03-12
Who should care
Siemens NX administrators, security teams, and OT/engineering workstation owners running NX—especially deployments that use managed mode and allow privileged local access.
Technical summary
The advisory describes a data validation vulnerability in Siemens NX affecting the PDF export process. The published guidance indicates exploitation requires local access and privileged access to the application in managed mode, with possible impact up to arbitrary code execution. CISA’s republication also distinguishes NX and NX (Managed Mode) as affected product names and links remediation to Siemens ProductCERT SSA-535115.
Defensive priority
High — prioritize if NX is deployed in managed mode on systems where privileged local users or administrators are present.
Recommended defensive actions
- Update Siemens NX to V2512 or later, per the vendor remediation.
- Limit privileged local access to systems running NX, especially managed-mode deployments.
- Apply strong endpoint security, timely patching, and continuous monitoring for signs of compromise, as recommended by Siemens/CISA.
- Review CISA and Siemens advisories for product-specific guidance before scheduling maintenance.
Evidence notes
This debrief is based on the supplied CISA CSAF advisory ICSA-26-043-08, which republishes Siemens ProductCERT SSA-535115. The source text states that the vulnerability is a data validation issue in PDF export, that exploitation requires local access plus privileged access in managed mode, and that impact could include arbitrary code execution. The advisory was first published on 2026-02-10 and updated through 2026-03-12; those dates are used only as advisory timing context, not as separate issue dates. No KEV entry is provided in the source corpus.
Official resources
-
CVE-2026-22923 CVE record
CVE.org
-
CVE-2026-22923 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA on 2026-02-10 as ICSA-26-043-08, republishing Siemens ProductCERT SSA-535115; updated again on 2026-03-12. The source corpus does not provide a KEV listing.