CVE-2026-23719
Published: 10 February 2026
Summary
CVE-2026-23719 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Siemens Simcenter Femap. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 0.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the heap-based buffer overflow in vulnerable versions of Simcenter Femap and Nastran by requiring timely application of vendor patches to V2512 or later.
Implements memory protections such as ASLR, DEP, and stack canaries that mitigate exploitation of heap buffer overflows during NDB file parsing.
Enforces validation of information inputs like specially crafted NDB files to prevent buffer overflows from malformed data.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Heap buffer overflow in desktop client app enables arbitrary code execution via opening malicious NDB file (T1204.002), directly mapping to client-side exploitation (T1203).
NVD Description
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted NDB files. This could allow an attacker to execute…
more
code in the context of the current process.
Deeper analysisAI
CVE-2026-23719, published on 2026-02-10, is a heap-based buffer overflow vulnerability classified under CWE-122, affecting Simcenter Femap and Simcenter Nastran in all versions prior to V2512. The flaw occurs during the parsing of specially crafted NDB files, earning a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
A local attacker requires no privileges but needs user interaction, such as convincing a user to open a malicious NDB file in the affected application. Successful exploitation enables arbitrary code execution within the context of the current process, granting high-impact confidentiality, integrity, and availability effects.
Siemens ProductCERT advisory SSA-965753, available at https://cert-portal.siemens.com/productcert/html/ssa-965753.html, provides guidance on mitigations for this vulnerability.
Details
- CWE(s)