Remote Code Execution Vulnerability in Luxion KeyShot Viewer Due to KSP File Parsing
CVE-2024-5508
7.8HIGH
Summary
A vulnerability exists in Luxion KeyShot Viewer related to the parsing of KSP files, which results from the inadequate validation of user-supplied data. This flaw permits remote attackers to exploit the application by convincing a user to visit a malicious page or open a compromised file. Through this exploitation, an attacker can manipulate memory and perform an out-of-bounds write, enabling arbitrary code execution within the context of the current process. Users of affected versions are advised to apply necessary updates and practice caution when interacting with untrusted files or sources.
Affected Version(s)
KeyShot Viewer 2023.3_12.2.1.2
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved