CVE-2024-5509

Luxion KeyShot BIP File Parsing Uncontrolled Search Path Element Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BIP files. The issue results from loading a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22738.
References
Link Resource
https://www.zerodayinitiative.com/advisories/ZDI-24-540/ Third Party Advisory VDB Entry
https://www.keyshot.com/csirt/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:luxion:keyshot_network_rendering:*:*:*:*:*:*:*:*
cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*
cpe:2.3:a:luxion:keyshot_viewer:*:*:*:*:*:*:*:*

History

09 Aug 2024, 13:30

Type Values Removed Values Added
References () https://www.keyshot.com/csirt/ - () https://www.keyshot.com/csirt/ - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-24-540/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-540/ - Third Party Advisory, VDB Entry
CWE CWE-427
CPE cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*
cpe:2.3:a:luxion:keyshot_network_rendering:*:*:*:*:*:*:*:*
cpe:2.3:a:luxion:keyshot_viewer:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Luxion keyshot Network Rendering
Luxion
Luxion keyshot
Luxion keyshot Viewer

06 Jun 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-06 18:15

Updated : 2024-08-09 13:30


NVD link : CVE-2024-5509

Mitre link : CVE-2024-5509


JSON object : View

Products Affected

luxion

  • keyshot_network_rendering
  • keyshot_viewer
  • keyshot
CWE
CWE-427

Uncontrolled Search Path Element