Use-After-Free Code Execution Vulnerability in Luxion KeyShot
CVE-2025-2532
7.8HIGH
Summary
A vulnerability in Luxion KeyShot's parsing of USDC files could allow remote attackers to execute arbitrary code on affected systems. The flaw arises from improper validation of object existence before operations, leading to a use-after-free condition. To exploit this vulnerability, an attacker must lure the user into visiting a crafted web page or opening a malicious file, which then allows the execution of arbitrary code within the context of the current process. Securing against this type of vulnerability requires user awareness and system updates.
Affected Version(s)
KeyShot 2024 13.0.0 Build 92 4.10.171
References
CVSS V3.0
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved