CVE-2026-23718
Published: 10 February 2026
Summary
CVE-2026-23718 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Siemens Simcenter Femap. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 0.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely patching of the out-of-bounds read vulnerability in Simcenter Femap and Nastran versions prior to V2512 to prevent exploitation via malicious NDB files.
Requires validation of NDB file inputs to block specially crafted files that trigger the out-of-bounds read leading to code execution.
Implements memory protections like DEP and ASLR to mitigate arbitrary code execution from the out-of-bounds read vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local file parsing vulnerability in desktop application enables arbitrary code execution upon user opening a malicious NDB file.
NVD Description
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted NDB files. This could allow an attacker to…
more
execute code in the context of the current process.
Deeper analysisAI
CVE-2026-23718 is an out-of-bounds read vulnerability (CWE-125) present in Simcenter Femap and Simcenter Nastran, affecting all versions prior to V2512. The flaw arises during the parsing of specially crafted NDB files, which can lead to code execution in the context of the current process. The vulnerability received a CVSS v3.1 base score of 7.8.
Exploitation requires local access (AV:L) with low complexity (AC:L), no privileges (PR:N), and user interaction (UI:R), such as convincing a user to open a malicious NDB file in the affected application. A successful attack enables arbitrary code execution with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), all within the unchanged security scope (S:U).
Siemens' security advisory (SSA-965753) at https://cert-portal.siemens.com/productcert/html/ssa-965753.html details mitigation steps for this issue.
Details
- CWE(s)