CVE-2020-25199

7.8 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in WECON LeviStudioU allows attackers to execute arbitrary code by tricking users into opening malicious project files. This affects users of LeviStudioU Release Build 2019-09-21 and earlier versions. The vulnerability could lead to complete system compromise under the application's privileges.

💻 Affected Systems

Products:
  • WECON LeviStudioU
Versions: Release Build 2019-09-21 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the project file parsing functionality. All installations with affected versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with the privileges of the LeviStudioU application, potentially leading to lateral movement, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or remote code execution when users open malicious project files, potentially compromising the host system.

🟢

If Mitigated

Limited impact if proper application sandboxing, least privilege principles, and file validation are implemented.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious project file). No public exploit code was found in the referenced advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version after Release Build 2019-09-21

Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-20-238-03

Restart Required: Yes

Instructions:

1. Download latest version from WECON website. 2. Uninstall current version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Restrict project file execution

windows

Block execution of LeviStudioU project files from untrusted sources

Application sandboxing

windows

Run LeviStudioU in restricted user account with minimal privileges

🧯 If You Can't Patch

  • Discontinue use of LeviStudioU for critical operations
  • Implement strict file validation and only open project files from trusted sources

🔍 How to Verify

Check if Vulnerable:

Check LeviStudioU version in Help > About. If version is Release Build 2019-09-21 or earlier, system is vulnerable.

Check Version:

Check Help > About in LeviStudioU application

Verify Fix Applied:

Verify version is updated beyond Release Build 2019-09-21 in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from LeviStudioU.exe
  • Multiple failed project file load attempts
  • Memory access violations in application logs

Network Indicators:

  • Unexpected outbound connections from LeviStudioU process

SIEM Query:

Process Creation: LeviStudioU.exe AND (CommandLine Contains *.proj OR CommandLine Contains *.levi)

🔗 References

📤 Share & Export