CVE-2021-22651
📋 TL;DR
This directory traversal vulnerability in Luxion KeyShot products allows attackers to place malicious scripts in system startup folders by tricking users into opening specially crafted files. When exploited, this enables arbitrary code execution at system startup with the privileges of the logged-in user. All users of affected KeyShot versions are vulnerable.
💻 Affected Systems
- Luxion KeyShot
- Luxion KeyShot Viewer
- Luxion KeyShot Network Rendering
- Luxion KeyVR
📦 What is this software?
Keyshot by Luxion
Keyvr by Luxion
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via persistent malware installation that executes automatically on every system boot, potentially leading to data theft, ransomware deployment, or lateral movement within networks.
Likely Case
Local privilege escalation leading to malware persistence, data exfiltration, or system disruption when users open malicious KeyShot files.
If Mitigated
Limited impact if users have restricted privileges, application whitelisting, or file execution restrictions in startup folders.
🎯 Exploit Status
Exploitation requires user to open malicious file; ZDI advisory confirms exploit details. Weaponization likely due to low complexity and high impact.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.1 and later
Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf
Restart Required: Yes
Instructions:
1. Download KeyShot 10.1 or later from official vendor site. 2. Install update following vendor instructions. 3. Restart system to ensure patch is fully applied.
🔧 Temporary Workarounds
Restrict startup folder permissions
windowsSet restrictive permissions on system startup folders to prevent unauthorized script placement.
icacls "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup" /deny Everyone:(OI)(CI)F
icacls "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp" /deny Everyone:(OI)(CI)F
Use application whitelisting
allImplement application control policies to prevent unauthorized executables from running from startup locations.
🧯 If You Can't Patch
- Restrict user privileges to prevent writing to startup folders
- Implement email/web filtering to block suspicious KeyShot files
- Educate users not to open KeyShot files from untrusted sources
- Monitor startup folder modifications using file integrity monitoring
🔍 How to Verify
Check if Vulnerable:
Check KeyShot version via Help > About; if version is below 10.1, system is vulnerable.
Check Version:
On Windows: Check registry at HKEY_LOCAL_MACHINE\SOFTWARE\Luxion\KeyShot\Version or run 'keyshot --version' from command line if available.
Verify Fix Applied:
Confirm version is 10.1 or higher in Help > About menu; test with known safe KeyShot files to ensure normal operation.
📡 Detection & Monitoring
Log Indicators:
- Unexpected file writes to startup folders (C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp or %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup)
- KeyShot process spawning unusual child processes
- Failed attempts to write to protected startup locations
Network Indicators:
- KeyShot processes making unexpected network connections after startup
- Downloads of KeyShot files from untrusted sources followed by startup folder modifications
SIEM Query:
EventID=4663 OR EventID=4656 AND ObjectName LIKE '%Startup%' AND ProcessName LIKE '%KeyShot%'
🔗 References
- https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf
- https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01
- https://www.zerodayinitiative.com/advisories/ZDI-21-324/
- https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf
- https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01
- https://www.zerodayinitiative.com/advisories/ZDI-21-324/