CVE-2023-44439
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on Ashlar-Vellum Xenon installations by tricking users into opening malicious files or visiting malicious pages. The flaw exists in how the software loads libraries from unsecured locations during file parsing. Users of Ashlar-Vellum Xenon who open untrusted files are at risk.
💻 Affected Systems
- Ashlar-Vellum Xenon
📦 What is this software?
Xenon by Ashlar
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Local privilege escalation or malware execution in the user context, potentially leading to credential theft, data exfiltration, or persistence mechanisms.
If Mitigated
Limited impact with proper application sandboxing, restricted user privileges, and network segmentation preventing lateral movement.
🎯 Exploit Status
Exploitation requires user interaction but is technically straightforward once malicious file is opened.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched version
Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-1597/
Restart Required: Yes
Instructions:
1. Check current Xenon version
2. Visit Ashlar-Vellum support portal
3. Download and install latest security update
4. Restart system
🔧 Temporary Workarounds
Restrict file execution from untrusted locations
windowsConfigure Windows to prevent DLL loading from untrusted directories
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -Name 'CWDIllegalInDllSearch' -Value 0x1
Application sandboxing
windowsRun Xenon with restricted privileges using application control solutions
🧯 If You Can't Patch
- Implement strict user training about opening untrusted files
- Deploy application whitelisting to prevent unauthorized executables
🔍 How to Verify
Check if Vulnerable:
Check Xenon version against vendor advisory; test with proof-of-concept if available
Check Version:
Check Help > About in Xenon application or examine installed programs in Control Panel
Verify Fix Applied:
Verify Xenon version matches patched version from vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Unexpected DLL loads from unusual directories
- Process creation from Xenon with suspicious parent processes
- File access to known malicious extensions
Network Indicators:
- Outbound connections from Xenon to unknown IPs
- DNS requests for suspicious domains following file opens
SIEM Query:
Process Creation where (Image contains 'xenon' OR ParentImage contains 'xenon') AND CommandLine contains '.dll'