KeyShot Viewer KSP File Parsing Use-After-Free Remote Code Execution Vulnerability
CVE-2024-30375
7.8HIGH
Key Information:
- Vendor
- Luxion
- Status
- Keyshot Viewer
- Vendor
- CVE Published:
- 6 June 2024
Summary
The vulnerability in Luxion KeyShot Viewer arises from a security flaw during the parsing of KSP files, leading to a use-after-free condition. This flaw enables remote attackers to execute arbitrary code on the affected installations if a user interacts with a malicious webpage or file. The absence of rigorous checks for object validation prior to executing operations creates a pathway for exploitation, allowing adversaries to manipulate the current process context. Users and organizations are advised to apply necessary precautions and updates to mitigate exposure to this vulnerability.
Affected Version(s)
KeyShot Viewer 2023.3_12.2.1.2
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved