CVE-2021-27488

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted CATPart files in KeyShot 3D rendering software. An attacker can exploit improper validation in multiple 3D file reading modules to write past allocated memory boundaries and execute arbitrary code. Users of KeyShot versions v10.1 and prior who process untrusted CATPart files are affected.

💻 Affected Systems

Products:
  • KeyShot
Versions: v10.1 and prior
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations processing CATPart files are vulnerable. The vulnerability affects multiple 3D reading modules including CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, and Jt3dReadPsr.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the KeyShot process, potentially leading to lateral movement, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or remote code execution when users open malicious CATPart files, potentially leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact with proper file validation and user privilege restrictions, potentially causing application crashes but no code execution.

🌐 Internet-Facing: MEDIUM - Exploitation requires user interaction to open malicious files, but could be delivered via email attachments or compromised websites.
🏢 Internal Only: HIGH - In enterprise environments, users frequently exchange 3D design files internally, creating multiple attack vectors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious CATPart files. The vulnerability is an out-of-bounds write that can lead to arbitrary code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: KeyShot v10.2 and later

Vendor Advisory: https://www.keyshot.com/support/

Restart Required: Yes

Instructions:

1. Download KeyShot v10.2 or later from the official website. 2. Run the installer and follow on-screen instructions. 3. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict CATPart file processing

all

Block or restrict processing of CATPart files through application controls or file type restrictions.

Run with reduced privileges

windows

Configure KeyShot to run with limited user privileges to reduce impact of successful exploitation.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use network segmentation to isolate systems running vulnerable KeyShot versions

🔍 How to Verify

Check if Vulnerable:

Check KeyShot version in Help > About menu. If version is 10.1 or earlier, the system is vulnerable.

Check Version:

On Windows: Check registry at HKEY_LOCAL_MACHINE\SOFTWARE\Luxion\KeyShot\Version or check Help > About in application

Verify Fix Applied:

Verify KeyShot version is 10.2 or later in Help > About menu and test with known safe CATPart files.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing CATPart files
  • Unusual process creation from KeyShot executable

Network Indicators:

  • Unexpected outbound connections from KeyShot process
  • File downloads triggered by KeyShot

SIEM Query:

Process Creation where ParentImage contains 'keyshot.exe' AND NOT (Image contains expected_child_processes)

🔗 References

📤 Share & Export