Use-After-Free Code Execution Vulnerability in Luxion KeyShot
CVE-2025-2532

7.8HIGH

Key Information:

Vendor
Luxion
Status
Vendor
CVE Published:
25 March 2025

Summary

A vulnerability in Luxion KeyShot's parsing of USDC files could allow remote attackers to execute arbitrary code on affected systems. The flaw arises from improper validation of object existence before operations, leading to a use-after-free condition. To exploit this vulnerability, an attacker must lure the user into visiting a crafted web page or opening a malicious file, which then allows the execution of arbitrary code within the context of the current process. Securing against this type of vulnerability requires user awareness and system updates.

Affected Version(s)

KeyShot 2024 13.0.0 Build 92 4.10.171

References

CVSS V3.0

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.