CVE-2019-12518

9.8 CRITICAL

📋 TL;DR

CVE-2019-12518 is a buffer overflow vulnerability in Anviz CrossChex access control management software that allows remote attackers to execute arbitrary code on affected systems. This affects organizations using vulnerable versions of the software for physical access control management. The vulnerability is particularly dangerous because it can be exploited without authentication.

💻 Affected Systems

Products:
  • Anviz CrossChex
Versions: 4.3.8.0 and 4.3.12
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Software is typically installed on Windows systems managing physical access control devices

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, attacker gaining administrative control over access control systems, potential physical security breach

🟠

Likely Case

Remote code execution allowing attacker to install malware, steal credentials, or disrupt access control operations

🟢

If Mitigated

Limited impact if system is isolated, properly segmented, and monitored with intrusion detection

🌐 Internet-Facing: HIGH - Software is often exposed to networks for remote management, and exploit requires no authentication
🏢 Internal Only: HIGH - Even internally, buffer overflow can lead to system compromise and lateral movement

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available, no authentication required, making this easily exploitable

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 4.3.12

Vendor Advisory: Not publicly documented by vendor

Restart Required: Yes

Instructions:

1. Contact Anviz for latest secure version 2. Backup configuration 3. Install updated version 4. Restart system 5. Verify functionality

🔧 Temporary Workarounds

Network Segmentation

all

Isolate CrossChex server from untrusted networks and internet

Configure firewall rules to restrict access to CrossChex server

Application Whitelisting

windows

Prevent unauthorized code execution via buffer overflow

Configure Windows AppLocker or similar to restrict executable execution

🧯 If You Can't Patch

  • Implement strict network segmentation - isolate CrossChex server to management VLAN only
  • Deploy host-based intrusion prevention system (HIPS) with buffer overflow protection

🔍 How to Verify

Check if Vulnerable:

Check CrossChex version in Help > About menu or program files properties

Check Version:

Check Help > About in CrossChex application or examine program file properties

Verify Fix Applied:

Verify version is newer than 4.3.12 and test buffer overflow protection

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from CrossChex.exe
  • Memory access violations in Windows event logs
  • Network connections to unusual ports from CrossChex

Network Indicators:

  • Unusual traffic patterns to CrossChex default port
  • Exploit pattern detection in network traffic

SIEM Query:

source="windows" AND (process_name="CrossChex.exe" AND (event_id="4688" OR event_id="4663")) OR (source="firewall" AND dest_port="[CrossChex_port]" AND pattern="buffer_overflow")

🔗 References

📤 Share & Export