CVE-2023-34271

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running Fatek Automation FvDesigner software by tricking users into opening malicious FPJ files. The flaw exists in how the software parses FPJ files, enabling attackers to write beyond allocated memory boundaries and gain control of the application process. Users of Fatek Automation FvDesigner who open untrusted FPJ files are at risk.

💻 Affected Systems

Products:
  • Fatek Automation FvDesigner
Versions: All versions prior to patched release
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction to open malicious FPJ files. No special configurations required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to compromise of the user's workstation, potentially enabling credential theft, data exfiltration, or installation of persistent malware.

🟢

If Mitigated

Limited impact with application crash or denial of service if exploit attempts are blocked by security controls, though successful exploitation could still occur.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability is well-documented and weaponization is likely given the RCE nature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Fatek Automation official advisory

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-769/

Restart Required: Yes

Instructions:

1. Contact Fatek Automation for patch availability
2. Download and install the latest version of FvDesigner
3. Restart the application and system as required
4. Verify patch installation

🔧 Temporary Workarounds

Block FPJ file execution

windows

Prevent FvDesigner from opening FPJ files by modifying file associations or using application control

Use Windows Group Policy to modify file associations
Implement application whitelisting to block FPJ file execution

User awareness training

all

Train users to avoid opening FPJ files from untrusted sources

🧯 If You Can't Patch

  • Implement strict application control policies to prevent execution of FvDesigner
  • Isolate affected systems in segmented network zones with limited access

🔍 How to Verify

Check if Vulnerable:

Check FvDesigner version against patched version from vendor advisory

Check Version:

Check FvDesigner 'About' dialog or installation directory for version information

Verify Fix Applied:

Verify installed version matches or exceeds patched version from vendor

📡 Detection & Monitoring

Log Indicators:

  • Unexpected FvDesigner crashes
  • FPJ file access from unusual locations
  • Process creation by FvDesigner with unusual parameters

Network Indicators:

  • Outbound connections from FvDesigner to suspicious IPs
  • File downloads to systems running FvDesigner

SIEM Query:

Process Creation where Image contains 'FvDesigner' AND CommandLine contains '.fpj'

🔗 References

📤 Share & Export