Cyber Posture

CVE-2026-23719

High

Published: 10 February 2026

Published
10 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23719 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Siemens Simcenter Femap. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 0.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the heap-based buffer overflow in vulnerable versions of Simcenter Femap and Nastran by requiring timely application of vendor patches to V2512 or later.

prevent

Implements memory protections such as ASLR, DEP, and stack canaries that mitigate exploitation of heap buffer overflows during NDB file parsing.

prevent

Enforces validation of information inputs like specially crafted NDB files to prevent buffer overflows from malformed data.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Heap buffer overflow in desktop client app enables arbitrary code execution via opening malicious NDB file (T1204.002), directly mapping to client-side exploitation (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted NDB files. This could allow an attacker to execute…

more

code in the context of the current process.

Deeper analysisAI

CVE-2026-23719, published on 2026-02-10, is a heap-based buffer overflow vulnerability classified under CWE-122, affecting Simcenter Femap and Simcenter Nastran in all versions prior to V2512. The flaw occurs during the parsing of specially crafted NDB files, earning a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

A local attacker requires no privileges but needs user interaction, such as convincing a user to open a malicious NDB file in the affected application. Successful exploitation enables arbitrary code execution within the context of the current process, granting high-impact confidentiality, integrity, and availability effects.

Siemens ProductCERT advisory SSA-965753, available at https://cert-portal.siemens.com/productcert/html/ssa-965753.html, provides guidance on mitigations for this vulnerability.

Details

CWE(s)

Affected Products

siemens
simcenter femap
≤ 2512.0000
siemens
simcenter nastran
≤ 2512.0000

CVEs Like This One

CVE-2026-23720Same product: Siemens Simcenter Femap
CVE-2026-23715Same product: Siemens Simcenter Femap
CVE-2026-23716Same product: Siemens Simcenter Femap
CVE-2026-23717Same product: Siemens Simcenter Femap
CVE-2026-23718Same product: Siemens Simcenter Femap
CVE-2025-25175Same product: Siemens Simcenter Femap
CVE-2025-23397Same vendor: Siemens
CVE-2025-23402Same vendor: Siemens
CVE-2025-23401Same vendor: Siemens
CVE-2025-27438Same vendor: Siemens

References