CVE-2020-6155

7.8 HIGH

📋 TL;DR

A heap overflow vulnerability in Pixar OpenUSD 20.05 allows remote code execution when parsing specially crafted binary USD files. Attackers can exploit this by tricking users into opening malicious files. Anyone using OpenUSD 20.05 to process USD files is affected.

💻 Affected Systems

Products:
  • Pixar OpenUSD
Versions: Version 20.05
Operating Systems: All platforms running OpenUSD
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the core USD parsing functionality, so all configurations that process binary USD files are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution with the privileges of the user running the vulnerable software, potentially leading to complete system compromise.

🟠

Likely Case

Application crash or denial of service, with potential for code execution if exploit is successful.

🟢

If Mitigated

Limited to denial of service if exploit fails or is blocked by security controls.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but could be delivered via web applications or email.
🏢 Internal Only: MEDIUM - Internal users could be targeted via shared files or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Proof of concept available in Talos advisory. Exploitation requires user to open malicious file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 20.05 (20.08 or later)

Vendor Advisory: https://github.com/PixarAnimationStudios/USD/releases

Restart Required: No

Instructions:

1. Update OpenUSD to version 20.08 or later. 2. Recompile any applications using OpenUSD libraries. 3. Replace any vulnerable USD files with patched versions.

🔧 Temporary Workarounds

Disable binary USD file processing

all

Configure applications to only accept ASCII USD files instead of binary USD files

Application-specific configuration required

File type filtering

all

Block or quarantine .usd/.usda/.usdc files at network boundaries

firewall or email filter configuration required

🧯 If You Can't Patch

  • Implement strict file validation for all USD files before processing
  • Run OpenUSD in sandboxed/isolated environments with minimal privileges

🔍 How to Verify

Check if Vulnerable:

Check OpenUSD version: usdview --version or examine linked libraries in applications

Check Version:

usdview --version | grep 'USD'

Verify Fix Applied:

Confirm version is 20.08 or later and test with known malicious USD files

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing USD files
  • Memory access violation errors in application logs

Network Indicators:

  • Unexpected USD file downloads from untrusted sources
  • Large binary file transfers to USD processing systems

SIEM Query:

source="application.log" AND ("segmentation fault" OR "heap overflow" OR "access violation") AND "usd"

🔗 References

📤 Share & Export