CVE-2023-34273

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Fatek Automation FvDesigner installations by tricking users into opening malicious FPJ files. The flaw exists in FPJ file parsing where improper data validation enables out-of-bounds writes. Users of Fatek Automation FvDesigner software are affected.

💻 Affected Systems

Products:
  • Fatek Automation FvDesigner
Versions: Specific versions not publicly disclosed in available references; all versions prior to patched version are likely affected
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: FvDesigner is industrial control system (ICS) software used for programming Fatek PLCs. The vulnerability requires user interaction to open malicious FPJ files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to compromise of the user's workstation, potentially enabling credential theft, data exfiltration, or further network attacks.

🟢

If Mitigated

Limited impact with only the FvDesigner process affected if proper application sandboxing and least privilege principles are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability was discovered by Zero Day Initiative (ZDI-CAN-18183).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-771/

Restart Required: Yes

Instructions:

1. Contact Fatek Automation for patch availability
2. Download and install the latest version of FvDesigner
3. Restart the system after installation
4. Verify the patch is applied correctly

🔧 Temporary Workarounds

Restrict FPJ file execution

windows

Block execution of FPJ files or restrict FvDesigner from opening untrusted files

Use Windows Group Policy to block .fpj file execution
Configure application control policies to restrict FvDesigner

User awareness training

all

Train users to only open FPJ files from trusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to only allow execution of signed FvDesigner binaries
  • Isolate FvDesigner systems from critical network segments and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check FvDesigner version against vendor patched version. If unable to determine, assume vulnerable if using any version prior to the latest release.

Check Version:

Check FvDesigner 'About' dialog or program properties in Windows

Verify Fix Applied:

Verify FvDesigner version matches or exceeds the patched version provided by Fatek Automation. Test with known safe FPJ files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected FvDesigner crashes
  • Suspicious process creation from FvDesigner
  • Multiple failed attempts to open FPJ files

Network Indicators:

  • Unusual outbound connections from FvDesigner process
  • File downloads to systems running FvDesigner

SIEM Query:

Process Creation where (Image contains 'FvDesigner' OR ParentImage contains 'FvDesigner') AND CommandLine contains '.fpj'

🔗 References

📤 Share & Export