CVE-2023-34267

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Fatek Automation FvDesigner installations by tricking users into opening malicious FPJ files. The flaw exists in FPJ file parsing where improper data validation enables out-of-bounds writes. Users of Fatek FvDesigner software are affected.

💻 Affected Systems

Products:
  • Fatek Automation FvDesigner
Versions: All versions prior to patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: This is a client-side application vulnerability requiring user interaction to open malicious FPJ files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to compromise of the user's workstation, potentially enabling credential theft, data exfiltration, or further network reconnaissance.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash but not full system compromise.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of FPJ file format structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Fatek Automation for latest version

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-765/

Restart Required: Yes

Instructions:

1. Contact Fatek Automation for patch availability
2. Download and install the latest version of FvDesigner
3. Restart the application and verify installation

🔧 Temporary Workarounds

Block FPJ file extensions

windows

Prevent execution of FPJ files at the system or network level

Application sandboxing

windows

Run FvDesigner in restricted environment with limited privileges

🧯 If You Can't Patch

  • Implement strict user training about opening untrusted files
  • Deploy application control policies to restrict FvDesigner execution

🔍 How to Verify

Check if Vulnerable:

Check FvDesigner version against vendor's patched version list

Check Version:

Check Help > About in FvDesigner application

Verify Fix Applied:

Verify FvDesigner version matches or exceeds patched version from vendor

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected FPJ file processing from untrusted sources

Network Indicators:

  • Downloads of FPJ files from untrusted sources
  • Unusual outbound connections after FPJ file processing

SIEM Query:

Process creation events for FvDesigner.exe followed by network connections or file writes

🔗 References

📤 Share & Export