CVE-2023-34269

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Fatek Automation FvDesigner installations by tricking users into opening malicious FPJ files. The flaw exists in FPJ file parsing where improper data validation enables out-of-bounds writes. Users of Fatek Automation FvDesigner who open untrusted FPJ files are affected.

💻 Affected Systems

Products:
  • Fatek Automation FvDesigner
Versions: Specific versions not specified in provided references, but likely multiple versions prior to patched release
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction (opening malicious FPJ file). FvDesigner is industrial control system software used for PLC programming.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or system compromise on the user's workstation, potentially enabling credential theft, data exfiltration, or installation of persistent malware.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash or denial of service.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability is in file parsing logic, making exploitation non-trivial but feasible for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-767/

Restart Required: Yes

Instructions:

1. Contact Fatek Automation for patched version
2. Download and install updated FvDesigner software
3. Restart system after installation
4. Verify installation with version check

🔧 Temporary Workarounds

Restrict FPJ file handling

windows

Configure system to open FPJ files with alternative applications or block FPJ file execution in FvDesigner

Use Windows Group Policy to modify file associations for .fpj files

Application sandboxing

windows

Run FvDesigner in restricted user context with minimal privileges

Create dedicated low-privilege user account for FvDesigner operations

🧯 If You Can't Patch

  • Implement strict file handling policies to prevent opening untrusted FPJ files
  • Deploy application control solutions to restrict FvDesigner execution to trusted environments only

🔍 How to Verify

Check if Vulnerable:

Check FvDesigner version against vendor's patched version list. If unable to determine, assume vulnerable if using any version prior to vendor's security update announcement.

Check Version:

Launch FvDesigner and check 'About' or version information in application interface

Verify Fix Applied:

Verify FvDesigner version matches or exceeds patched version specified by Fatek Automation. Test with known safe FPJ files to ensure application functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected FvDesigner crashes when processing FPJ files
  • Unusual process creation from FvDesigner executable
  • Network connections originating from FvDesigner process

Network Indicators:

  • Outbound connections from FvDesigner to unexpected destinations
  • DNS requests for suspicious domains from workstation running FvDesigner

SIEM Query:

Process Creation where (Image contains 'FvDesigner' OR ParentImage contains 'FvDesigner') AND CommandLine contains '.fpj'

🔗 References

📤 Share & Export