CVE-2020-16243

7.8 HIGH

📋 TL;DR

This CVE describes multiple buffer overflow vulnerabilities in LeviStudioU software that allow remote code execution. Attackers can exploit these vulnerabilities by tricking users into opening specially crafted project files, potentially gaining the same privileges as the application. Users of LeviStudioU version 2019-09-21 and prior are affected.

💻 Affected Systems

Products:
  • LeviStudioU
Versions: 2019-09-21 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction to open malicious project files. Typically affects industrial control system engineering workstations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the LeviStudioU application, potentially leading to lateral movement, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or remote code execution on systems where LeviStudioU runs with elevated privileges, allowing attackers to install malware or steal sensitive engineering data.

🟢

If Mitigated

Limited impact if application runs with minimal privileges and proper file validation is in place, potentially resulting only in application crash.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to get users to open malicious project files. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2019-09-21

Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-20-238-03

Restart Required: Yes

Instructions:

1. Download and install the latest version of LeviStudioU from the official vendor website. 2. Replace all older versions with the patched version. 3. Restart the system to ensure all components are updated.

🔧 Temporary Workarounds

Restrict project file handling

windows

Configure system to open LeviStudioU project files only with the patched version or block suspicious project files.

Use Windows Group Policy to restrict file associations for .lsp files to only the patched LeviStudioU version

User privilege reduction

windows

Run LeviStudioU with minimal necessary privileges to limit potential damage from exploitation.

Runas /user:standarduser "C:\Program Files\LeviStudioU\LeviStudioU.exe"

🧯 If You Can't Patch

  • Implement strict access controls to limit who can open project files and from which sources
  • Deploy application whitelisting to prevent execution of unauthorized code even if exploitation occurs

🔍 How to Verify

Check if Vulnerable:

Check LeviStudioU version in Help > About menu. If version is 2019-09-21 or earlier, the system is vulnerable.

Check Version:

Check application version through Help > About menu in LeviStudioU GUI

Verify Fix Applied:

Verify LeviStudioU version is later than 2019-09-21 and test opening known good project files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Multiple application crashes of LeviStudioU
  • Unusual process creation from LeviStudioU executable
  • Access to suspicious project files from untrusted sources

Network Indicators:

  • Downloads of project files from unknown external sources
  • Unusual outbound connections from LeviStudioU process

SIEM Query:

Process Creation where Image contains 'LeviStudioU' and CommandLine contains unusual parameters OR ParentImage contains 'LeviStudioU' and Image not in approved list

🔗 References

📤 Share & Export