CVE-2022-43618

7.8 HIGH

📋 TL;DR

CVE-2022-43618 is a heap-based buffer overflow vulnerability in CorelDRAW Graphics Suite that allows remote code execution when processing malicious PCX files. Attackers can exploit this by tricking users into opening specially crafted files, potentially compromising their systems. This affects users of CorelDRAW Graphics Suite version 23.5.0.506.

💻 Affected Systems

Products:
  • Corel CorelDRAW Graphics Suite
Versions: 23.5.0.506
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific version mentioned; other versions may be unaffected. Requires user interaction to open malicious PCX files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer, enabling data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions preventing full system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once a malicious file is opened. The vulnerability was discovered by Zero Day Initiative (ZDI-CAN-16377).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version later than 23.5.0.506

Vendor Advisory: https://www.coreldraw.com/en/pages/security-advisories/

Restart Required: Yes

Instructions:

1. Open CorelDRAW Graphics Suite. 2. Navigate to Help > Check for Updates. 3. Follow prompts to download and install the latest version. 4. Restart the application and system if required.

🔧 Temporary Workarounds

Block PCX file extensions

windows

Prevent opening of PCX files via group policy or application restrictions

Using Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: Path: *.pcx, Security Level: Disallowed

User awareness training

all

Educate users to avoid opening untrusted PCX files

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized software
  • Deploy endpoint detection and response (EDR) solutions to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check CorelDRAW version via Help > About CorelDRAW. If version is 23.5.0.506, the system is vulnerable.

Check Version:

In CorelDRAW: Help > About CorelDRAW

Verify Fix Applied:

After updating, verify version is no longer 23.5.0.506 via Help > About CorelDRAW.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected process creation from CorelDRAW executable
  • File access to PCX files followed by abnormal behavior

Network Indicators:

  • Outbound connections from CorelDRAW process to unknown IPs
  • DNS requests for suspicious domains following PCX file processing

SIEM Query:

EventID=1000 OR EventID=1001 AND SourceName="Application Error" AND ProcessName="CorelDRW.exe"

🔗 References

📤 Share & Export