CVE-2022-27579

7.8 HIGH

📋 TL;DR

CVE-2022-27579 is a deserialization vulnerability in Flexi Soft Designer that allows attackers to execute arbitrary code by tricking users into opening malicious project files. All versions up to and including 1.9.4 SP1 are affected. This vulnerability compromises confidentiality, integrity, and availability of systems running the vulnerable software.

💻 Affected Systems

Products:
  • Flexi Soft Designer
Versions: All versions up to and including 1.9.4 SP1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in a .NET framework class used by the software. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware execution when users open malicious project files from untrusted sources, leading to data loss or system disruption.

🟢

If Mitigated

Limited impact if users only open trusted project files and proper access controls are in place, though the vulnerability remains present.

🌐 Internet-Facing: LOW with brief explanation: The vulnerability requires user interaction to open malicious files, making direct internet exploitation unlikely unless combined with social engineering.
🏢 Internal Only: MEDIUM with brief explanation: Internal users could be tricked into opening malicious project files via phishing or shared drives, leading to lateral movement within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction to open a malicious project file. The vulnerability is in deserialization code, making reliable exploitation relatively straightforward for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.9.4 SP1

Vendor Advisory: https://sick.com/psirt

Restart Required: Yes

Instructions:

1. Download the latest version of Flexi Soft Designer from the official SICK website. 2. Uninstall the current vulnerable version. 3. Install the updated version. 4. Restart the system to ensure all components are properly loaded.

🔧 Temporary Workarounds

Restrict project file execution

windows

Configure Windows to open .fsd project files with a text editor instead of Flexi Soft Designer to prevent automatic code execution.

Right-click .fsd file > Open with > Choose another app > Select Notepad or another text editor > Check 'Always use this app to open .fsd files'

User awareness training

all

Train users to only open project files from trusted sources and verify file integrity before opening.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized software
  • Restrict user permissions to limit potential damage from successful exploitation

🔍 How to Verify

Check if Vulnerable:

Check the Flexi Soft Designer version in Help > About. If version is 1.9.4 SP1 or earlier, the system is vulnerable.

Check Version:

Open Flexi Soft Designer and navigate to Help > About to view the version number.

Verify Fix Applied:

After updating, verify the version in Help > About shows a version higher than 1.9.4 SP1.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from Flexi Soft Designer
  • Abnormal file access patterns from the application
  • Security software alerts about suspicious .NET deserialization

Network Indicators:

  • Unusual outbound connections from systems running Flexi Soft Designer
  • Downloads of project files from untrusted sources

SIEM Query:

Process creation where parent_process contains 'FlexiSoftDesigner' AND process_name NOT IN ('expected_processes_list')

🔗 References

📤 Share & Export