CVE-2023-22349

7.8 HIGH

📋 TL;DR

This CVE describes an out-of-bound read vulnerability in Screen Creator Advance 2 software that occurs when processing screen management information. Attackers can exploit this by tricking users into opening malicious project files, potentially leading to information disclosure or arbitrary code execution. Users of Screen Creator Advance 2 versions 0.1.1.4 Build01 and earlier are affected.

💻 Affected Systems

Products:
  • Screen Creator Advance 2
Versions: 0.1.1.4 Build01 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the screen management information processing component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Information disclosure of sensitive data from the application's memory, potentially including credentials or proprietary project information.

🟢

If Mitigated

Limited impact with proper user training and file validation controls in place.

🌐 Internet-Facing: LOW - Exploitation requires user interaction with malicious files, not directly internet-exposed services.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious project files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious project files. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 0.1.1.4 Build01

Vendor Advisory: https://www.electronics.jtekt.co.jp/en/topics/202302035233/

Restart Required: Yes

Instructions:

1. Download the latest version from JTEKT Electronics official website. 2. Uninstall the vulnerable version. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Restrict project file sources

all

Only open project files from trusted sources and implement file validation procedures.

User awareness training

all

Train users to recognize suspicious project files and avoid opening untrusted files.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of Screen Creator Advance 2
  • Use network segmentation to isolate systems running vulnerable software

🔍 How to Verify

Check if Vulnerable:

Check the software version in Help > About menu. If version is 0.1.1.4 Build01 or earlier, the system is vulnerable.

Check Version:

Check via application interface: Help > About in Screen Creator Advance 2

Verify Fix Applied:

Verify the installed version is newer than 0.1.1.4 Build01 and test opening known-good project files.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening project files
  • Unusual memory access patterns in application logs

Network Indicators:

  • Unusual outbound connections after opening project files

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName='ScreenCreatorAdvance2.exe' AND Description contains 'access violation'

🔗 References

📤 Share & Export