CVE-2023-44439

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Ashlar-Vellum Xenon installations by tricking users into opening malicious files or visiting malicious pages. The flaw exists in how the software loads libraries from unsecured locations during file parsing. Users of Ashlar-Vellum Xenon who open untrusted files are at risk.

💻 Affected Systems

Products:
  • Ashlar-Vellum Xenon
Versions: All versions prior to patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction (opening malicious file or visiting malicious page).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware execution in the user context, potentially leading to credential theft, data exfiltration, or persistence mechanisms.

🟢

If Mitigated

Limited impact with proper application sandboxing, restricted user privileges, and network segmentation preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once malicious file is opened.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-1597/

Restart Required: Yes

Instructions:

1. Check current Xenon version
2. Visit Ashlar-Vellum support portal
3. Download and install latest security update
4. Restart system

🔧 Temporary Workarounds

Restrict file execution from untrusted locations

windows

Configure Windows to prevent DLL loading from untrusted directories

Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -Name 'CWDIllegalInDllSearch' -Value 0x1

Application sandboxing

windows

Run Xenon with restricted privileges using application control solutions

🧯 If You Can't Patch

  • Implement strict user training about opening untrusted files
  • Deploy application whitelisting to prevent unauthorized executables

🔍 How to Verify

Check if Vulnerable:

Check Xenon version against vendor advisory; test with proof-of-concept if available

Check Version:

Check Help > About in Xenon application or examine installed programs in Control Panel

Verify Fix Applied:

Verify Xenon version matches patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loads from unusual directories
  • Process creation from Xenon with suspicious parent processes
  • File access to known malicious extensions

Network Indicators:

  • Outbound connections from Xenon to unknown IPs
  • DNS requests for suspicious domains following file opens

SIEM Query:

Process Creation where (Image contains 'xenon' OR ParentImage contains 'xenon') AND CommandLine contains '.dll'

🔗 References

📤 Share & Export