CVE-2022-21154

7.8 HIGH

📋 TL;DR

An integer overflow vulnerability in Leadtools 22's fltSaveCMP function when processing BMP files can lead to buffer overflow. Attackers can exploit this by providing malicious BMP files, potentially allowing arbitrary code execution. This affects systems running vulnerable versions of Leadtools software.

💻 Affected Systems

Products:
  • Leadtools
Versions: Version 22 (specifically mentioned in CVE)
Operating Systems: Windows, Linux, macOS (if Leadtools supports)
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using Leadtools 22's BMP processing functionality is vulnerable when handling untrusted BMP files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the application processing the BMP file, potentially leading to full system compromise.

🟠

Likely Case

Application crash (denial of service) or limited code execution depending on exploit sophistication and memory protections.

🟢

If Mitigated

Application crash with no code execution if modern exploit mitigations (ASLR, DEP) are effective.

🌐 Internet-Facing: MEDIUM - Requires user to open malicious BMP file; risk depends on application exposure.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting a malicious BMP file; no authentication needed to trigger the vulnerability if application processes the file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Leadtools 22 with security update (check vendor for specific version)

Vendor Advisory: https://files.leadtools.com/index.php/s/joFz7BcCZYMot5Q

Restart Required: Yes

Instructions:

1. Download the security update from Leadtools vendor site. 2. Apply the patch according to vendor instructions. 3. Restart affected applications/services. 4. Test BMP file processing functionality.

🔧 Temporary Workarounds

Restrict BMP file processing

all

Configure applications to reject or sandbox BMP file processing from untrusted sources.

Use application whitelisting

windows

Implement application control to prevent unauthorized execution of vulnerable Leadtools components.

🧯 If You Can't Patch

  • Implement strict input validation for BMP files; reject malformed or suspicious files.
  • Run Leadtools applications with least privilege accounts to limit potential damage from exploitation.

🔍 How to Verify

Check if Vulnerable:

Check Leadtools version; if version 22 is installed and not patched, assume vulnerable.

Check Version:

Check application documentation or vendor tools for version information; no universal command provided.

Verify Fix Applied:

Verify Leadtools version is updated to patched version and test with sample BMP files.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing BMP files
  • Unexpected memory access errors in logs

Network Indicators:

  • Unusual file transfers of BMP files to vulnerable systems

SIEM Query:

Search for application crash events related to Leadtools processes or BMP file processing.

🔗 References

📤 Share & Export