CVE-2023-34293

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Ashlar-Vellum Cobalt installations by tricking users into opening malicious X_B or X_T files. The flaw exists in improper data validation during file parsing, leading to an out-of-bounds write that can be exploited for code execution. Users of affected Ashlar-Vellum Cobalt software are at risk.

💻 Affected Systems

Products:
  • Ashlar-Vellum Cobalt
Versions: Specific affected versions not specified in provided references
Operating Systems: Windows (presumed based on typical CAD software deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: User interaction required - victim must open malicious X_B or X_T file. All installations parsing these file formats are likely vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attacker executes malicious code in the context of the current user, potentially installing malware, stealing sensitive data, or establishing persistence on the system.

🟢

If Mitigated

Limited impact due to proper security controls like application sandboxing, limited user privileges, and network segmentation preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability is in file parsing logic, making reliable exploitation dependent on specific memory layout conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-831/

Restart Required: Yes

Instructions:

1. Check Ashlar-Vellum website for security updates. 2. Download and install the latest patch. 3. Restart the application and any affected services. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Restrict File Types

windows

Block or restrict opening of X_B and X_T file types through application settings or group policy

User Awareness Training

all

Train users to only open files from trusted sources and to be cautious with unexpected file attachments

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized execution of Cobalt or related processes
  • Run Cobalt with reduced privileges using application sandboxing or limited user accounts

🔍 How to Verify

Check if Vulnerable:

Check if Ashlar-Vellum Cobalt is installed and what version is running. Review if X_B/X_T file parsing functionality is enabled.

Check Version:

Check application 'About' dialog or installation directory for version information

Verify Fix Applied:

Verify the installed version matches or exceeds the patched version from vendor advisory. Test with known safe X_B/X_T files to ensure proper parsing.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected application crashes when opening CAD files
  • Suspicious process creation from Cobalt executable
  • Multiple failed file parsing attempts

Network Indicators:

  • Unusual outbound connections from Cobalt process
  • File downloads from untrusted sources followed by Cobalt execution

SIEM Query:

Process Creation where Image contains 'cobalt' AND Parent Process is not expected CAD workflow

🔗 References

📤 Share & Export