CVE-2022-43613

7.8 HIGH

📋 TL;DR

CVE-2022-43613 is a stack-based buffer overflow vulnerability in CorelDRAW Graphics Suite that allows remote code execution when processing malicious CGM files. Attackers can exploit this by tricking users into opening specially crafted files or visiting malicious web pages. This affects users of CorelDRAW Graphics Suite version 23.5.0.506.

💻 Affected Systems

Products:
  • Corel CorelDRAW Graphics Suite
Versions: 23.5.0.506
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open malicious CGM file or visit malicious webpage that triggers file parsing.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the victim's workstation.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash but no code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

User interaction required but exploit is straightforward once malicious file is opened. ZDI advisory suggests reliable exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version (beyond 23.5.0.506)

Vendor Advisory: https://www.coreldraw.com/en/support/security-advisories/

Restart Required: Yes

Instructions:

1. Open CorelDRAW Graphics Suite 2. Go to Help > Check for Updates 3. Follow prompts to install latest version 4. Restart application and system if prompted

🔧 Temporary Workarounds

Block CGM file extensions

all

Prevent opening of CGM files by blocking the file extension at email gateways and web proxies

Disable CGM file association

windows

Remove CorelDRAW as default handler for .cgm files in Windows

Open Windows Settings > Apps > Default apps > Choose default apps by file type > Find .cgm and change to Notepad or another safe viewer

🧯 If You Can't Patch

  • Implement application allowlisting to restrict execution of CorelDRAW to trusted locations only
  • Use endpoint protection with behavioral analysis to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check CorelDRAW version in Help > About CorelDRAW. If version is 23.5.0.506 or earlier, system is vulnerable.

Check Version:

In CorelDRAW: Help > About CorelDRAW

Verify Fix Applied:

Verify version is updated beyond 23.5.0.506 and attempt to open a test CGM file to ensure proper parsing.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening CGM files
  • Unusual process spawning from CorelDRAW executable
  • Memory access violation events in Windows Event Logs

Network Indicators:

  • Downloads of CGM files from untrusted sources
  • Outbound connections from CorelDRAW process to suspicious IPs

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="CorelDRW.exe" AND ExceptionCode="c0000005"

🔗 References

📤 Share & Export