CVE-2023-34305

7.0 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Ashlar-Vellum Cobalt installations by tricking users into opening malicious X_B or X_T files. The flaw is an out-of-bounds write due to improper input validation during file parsing. Affected users include anyone using vulnerable versions of Ashlar-Vellum Cobalt software.

💻 Affected Systems

Products:
  • Ashlar-Vellum Cobalt
Versions: Specific versions not detailed in advisory; all versions prior to patch are likely affected
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction (opening malicious file or visiting malicious page)

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution with current user privileges, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Attacker gains code execution in the context of the current user, enabling data access, privilege escalation, or persistence mechanisms.

🟢

If Mitigated

Limited impact if proper application sandboxing, least privilege, and file validation controls are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires social engineering to deliver malicious file; no authentication needed once file is opened

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-865/

Restart Required: Yes

Instructions:

1. Check Ashlar-Vellum website for security updates
2. Download and install latest version
3. Restart system after installation

🔧 Temporary Workarounds

Block X_B and X_T file extensions

all

Prevent opening of potentially malicious files via email filters or endpoint protection

User awareness training

all

Educate users about risks of opening untrusted CAD files

🧯 If You Can't Patch

  • Run application with restricted privileges using least privilege principles
  • Implement application whitelisting to prevent unauthorized execution

🔍 How to Verify

Check if Vulnerable:

Check Ashlar-Vellum Cobalt version against vendor's patched version list

Check Version:

Check Help > About in Ashlar-Vellum Cobalt application

Verify Fix Applied:

Verify installed version matches or exceeds patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of Ashlar-Vellum Cobalt
  • Unusual file access patterns for X_B/X_T files

Network Indicators:

  • Downloads of X_B/X_T files from untrusted sources

SIEM Query:

Process:asahlar-vellum AND (FileExtension:X_B OR FileExtension:X_T) FROM suspicious_source

🔗 References

📤 Share & Export