CVE-2023-3495

7.8 HIGH

📋 TL;DR

This is an out-of-bounds write vulnerability in Hitachi EH-VIEW (KeypadDesigner) that allows local attackers to potentially execute arbitrary code. Users are affected when they open malicious files on unsupported installations. Only products no longer maintained by Hitachi are vulnerable.

💻 Affected Systems

Products:
  • Hitachi EH-VIEW (KeypadDesigner)
Versions: All versions (product is no longer supported)
Operating Systems: Windows (assumed based on typical industrial software)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations that are no longer supported by Hitachi. Requires user interaction to open malicious files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with arbitrary code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or malware execution within the user's context, potentially affecting other systems on the network.

🟢

If Mitigated

Limited impact if proper file handling controls and user awareness prevent malicious file execution.

🌐 Internet-Facing: LOW - Requires local access and user interaction with malicious files.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and user interaction. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://www.hitachi.com/hirt/hitachi-sec/2023/002.html

Restart Required: No

Instructions:

No official patch available as product is unsupported. Consider workarounds or replacement.

🔧 Temporary Workarounds

Restrict File Execution

windows

Prevent execution of untrusted files through application whitelisting or file type restrictions.

Use Windows AppLocker or similar to restrict EH-VIEW file execution

User Awareness Training

all

Train users not to open untrusted files with EH-VIEW software.

🧯 If You Can't Patch

  • Isolate affected systems from critical networks and implement strict network segmentation.
  • Implement application control to prevent execution of EH-VIEW from untrusted locations.

🔍 How to Verify

Check if Vulnerable:

Check if Hitachi EH-VIEW (KeypadDesigner) is installed on the system. If present and unsupported, assume vulnerable.

Check Version:

Check installed programs in Windows Control Panel or via 'wmic product get name,version'

Verify Fix Applied:

No fix available to verify. Workarounds must be validated through security controls testing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from EH-VIEW executable
  • Multiple file access failures from EH-VIEW

Network Indicators:

  • Unexpected outbound connections from systems running EH-VIEW

SIEM Query:

Process creation where parent_process contains 'EH-VIEW' or 'KeypadDesigner' AND process_name not in approved_list

🔗 References

📤 Share & Export