CVE-2023-36739

7.8 HIGH

📋 TL;DR

CVE-2023-36739 is a heap-based buffer overflow vulnerability in Microsoft 3D Viewer that allows remote code execution when a user opens a specially crafted malicious 3D file. Attackers can exploit this to execute arbitrary code with the privileges of the current user. This affects users of Microsoft 3D Viewer on Windows systems.

💻 Affected Systems

Products:
  • Microsoft 3D Viewer
Versions: All versions prior to the security update
Operating Systems: Windows 10, Windows 11
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open malicious 3D file. 3D Viewer is included by default in Windows 10/11.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's machine, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local user account compromise leading to data exfiltration, credential theft, and installation of persistent malware.

🟢

If Mitigated

Limited impact due to sandboxing or application isolation, potentially only application crash or denial of service.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious file, but can be delivered via email, web downloads, or file shares.
🏢 Internal Only: MEDIUM - Internal users opening malicious files from compromised internal sources or phishing campaigns.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious file. No public exploit code available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security update through Microsoft Store or Windows Update

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36739

Restart Required: No

Instructions:

1. Open Microsoft Store. 2. Click 'Library' and 'Get updates'. 3. Update 3D Viewer. Alternatively, apply Windows security updates through Windows Update.

🔧 Temporary Workarounds

Disable 3D Viewer file association

windows

Prevent 3D files from automatically opening in 3D Viewer

Control Panel > Default Programs > Associate a file type or protocol with a program > Change .3mf/.stl/.obj to open with different application

Uninstall 3D Viewer

windows

Remove vulnerable application entirely

Start > Settings > Apps > Apps & features > Microsoft 3D Viewer > Uninstall

🧯 If You Can't Patch

  • Implement application whitelisting to block 3D Viewer execution
  • Use email/web filtering to block malicious 3D file attachments and downloads

🔍 How to Verify

Check if Vulnerable:

Check 3D Viewer version in Microsoft Store > Library > Updates or Settings > Apps > Microsoft 3D Viewer > Advanced options

Check Version:

Get-AppxPackage Microsoft.Microsoft3DViewer | Select Version

Verify Fix Applied:

Verify 3D Viewer has been updated to latest version in Microsoft Store or confirm Windows security updates are applied

📡 Detection & Monitoring

Log Indicators:

  • Unexpected 3D Viewer process crashes
  • Suspicious child processes spawned from 3DViewer.exe

Network Indicators:

  • Outbound connections from 3DViewer.exe to unknown external IPs

SIEM Query:

Process Creation where Image contains '3DViewer.exe' and CommandLine contains suspicious parameters

🔗 References

📤 Share & Export