KeyShot Viewer KSP File Parsing Use-After-Free Remote Code Execution Vulnerability
CVE-2024-30375

7.8HIGH

Key Information:

Vendor
Luxion
Status
Keyshot Viewer
Vendor
CVE Published:
6 June 2024

Summary

The vulnerability in Luxion KeyShot Viewer arises from a security flaw during the parsing of KSP files, leading to a use-after-free condition. This flaw enables remote attackers to execute arbitrary code on the affected installations if a user interacts with a malicious webpage or file. The absence of rigorous checks for object validation prior to executing operations creates a pathway for exploitation, allowing adversaries to manipulate the current process context. Users and organizations are advised to apply necessary precautions and updates to mitigate exposure to this vulnerability.

Affected Version(s)

KeyShot Viewer 2023.3_12.2.1.2

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.