CVE-2023-42105

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Ashlar-Vellum Cobalt installations by tricking users into opening malicious AR files or visiting malicious web pages. The flaw exists in AR file parsing where improper data validation leads to type confusion, enabling code execution in the current process context. Users of Ashlar-Vellum Cobalt software are affected.

💻 Affected Systems

Products:
  • Ashlar-Vellum Cobalt
Versions: Specific versions not detailed in advisory, but likely multiple versions prior to patch
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: User interaction required (opening malicious file or visiting malicious page). All default configurations that process AR files are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running Cobalt, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Malware installation or data exfiltration from the compromised system, with impact limited to the user's privileges and system access.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only affecting the application process.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction but no authentication. The vulnerability was discovered by ZDI (ZDI-CAN-20562) and detailed in their advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-1454/

Restart Required: Yes

Instructions:

1. Check Ashlar-Vellum website for security updates. 2. Download and install the latest version of Cobalt. 3. Restart the application and any related services.

🔧 Temporary Workarounds

Disable AR file association

all

Prevent Cobalt from automatically opening AR files by changing file associations in the operating system.

Windows: Use 'Default Apps' settings to change .ar file association
macOS: Use 'Get Info' on .ar files to change 'Open With' setting

User education and restrictions

all

Train users not to open AR files from untrusted sources and implement application control policies.

🧯 If You Can't Patch

  • Implement application sandboxing or run Cobalt with minimal user privileges
  • Use network segmentation to isolate systems running vulnerable Cobalt versions

🔍 How to Verify

Check if Vulnerable:

Check Cobalt version against vendor patched versions. If unable to determine, assume vulnerable if using any version prior to the security update.

Check Version:

Windows: Check 'About' in Cobalt application menu; macOS: Check 'Cobalt > About Cobalt' in menu bar

Verify Fix Applied:

Verify installation of latest Cobalt version from vendor and confirm AR files open without issues.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from Cobalt executable
  • Cobalt crash logs with memory access violations

Network Indicators:

  • Outbound connections from Cobalt process to unknown IPs post-file opening

SIEM Query:

Process creation where parent_process contains 'cobalt' AND (command_line contains '.ar' OR image_path contains suspicious locations)

🔗 References

📤 Share & Export