CVE-2023-35126

7.8 HIGH

📋 TL;DR

An out-of-bounds write vulnerability in Ichitaro 2023 document processors allows memory corruption when parsing specially crafted documents. Attackers can exploit this to execute arbitrary code on affected systems. Users of Ichitaro 2023 version 1.0.1.59372 are vulnerable.

💻 Affected Systems

Products:
  • Ichitaro 2023
Versions: 1.0.1.59372
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in both DocumentViewStyles and DocumentEditStyles stream parsers when processing specific style record types.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the victim's computer, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Arbitrary code execution with the privileges of the user opening the malicious document, leading to data exfiltration, credential theft, or lateral movement within the network.

🟢

If Mitigated

Limited impact with proper application sandboxing and privilege separation, potentially resulting in application crash but no code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious document. No public exploit code has been identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://jvn.jp/en/jp/JVN28846531/index.html

Restart Required: Yes

Instructions:

1. Check for updates within Ichitaro 2023 application
2. Download and install the latest security update from vendor
3. Restart the application and verify patch installation

🔧 Temporary Workarounds

Disable document parsing features

windows

Restrict or disable the vulnerable document parsing functionality through application settings or group policy

Application sandboxing

windows

Run Ichitaro in a sandboxed environment to limit potential damage from exploitation

🧯 If You Can't Patch

  • Implement strict file type restrictions to block .jtd files at network perimeter
  • Deploy application allowlisting to prevent unauthorized Ichitaro execution

🔍 How to Verify

Check if Vulnerable:

Check Ichitaro 2023 version in Help > About. If version is 1.0.1.59372, system is vulnerable.

Check Version:

Not applicable - check through application GUI Help > About menu

Verify Fix Applied:

Verify installed version is newer than 1.0.1.59372 and check vendor advisory for specific patched version.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected process creation from Ichitaro.exe
  • Suspicious file access patterns

Network Indicators:

  • Downloads of .jtd files from untrusted sources
  • Outbound connections from Ichitaro process to suspicious IPs

SIEM Query:

source="windows" AND process_name="Ichitaro.exe" AND (event_id=1000 OR event_id=1001) AND message="ACCESS_VIOLATION"

🔗 References

📤 Share & Export