CVE-2023-38127

7.8 HIGH

📋 TL;DR

This vulnerability allows arbitrary code execution through a malicious Ichitaro document. An attacker can exploit an integer overflow in the HyperLinkFrame parser to cause memory corruption. Users of Ichitaro 2023 are affected.

💻 Affected Systems

Products:
  • Ichitaro 2023
Versions: 1.0.1.59372
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific Ichitaro 2023 version; other versions may be unaffected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Ichitaro user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or malware execution when a user opens a malicious document, often delivered via phishing.

🟢

If Mitigated

Limited impact if document execution is blocked or user runs with minimal privileges, potentially causing application crash only.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious document; no known public exploits as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version from vendor

Vendor Advisory: https://jvn.jp/en/jp/JVN28846531/index.html

Restart Required: Yes

Instructions:

1. Open Ichitaro 2023. 2. Navigate to Help > Check for Updates. 3. Follow prompts to install the latest version. 4. Restart the application.

🔧 Temporary Workarounds

Block Ichitaro document execution

windows

Prevent execution of Ichitaro documents via group policy or application control.

Use Windows Group Policy to block .jtd files or restrict Ichitaro execution.

🧯 If You Can't Patch

  • Restrict user privileges to minimal levels to limit impact of potential exploitation.
  • Implement email filtering to block suspicious Ichitaro attachments and educate users on phishing risks.

🔍 How to Verify

Check if Vulnerable:

Check Ichitaro version in Help > About; if version is 1.0.1.59372, it is vulnerable.

Check Version:

In Ichitaro, go to Help > About to view version.

Verify Fix Applied:

Verify version is updated to a newer release than 1.0.1.59372 after patching.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in Ichitaro logs, unexpected process launches from Ichitaro.

Network Indicators:

  • Outbound connections from Ichitaro to unknown IPs post-document opening.

SIEM Query:

Process creation where parent process is Ichitaro.exe and command line contains suspicious parameters.

🔗 References

📤 Share & Export