CVE-2023-52277

7.8 HIGH

📋 TL;DR

This vulnerability in RoyalTSX allows attackers to trigger heap memory corruption and application crashes via specially crafted RTSZ files containing long hostnames. When victims click 'Test Connection' in the SecureGatewayHost object processing, it can lead to denial of service or potentially other unspecified impacts. Users of RoyalTSX versions before 6.0.2.1 are affected.

💻 Affected Systems

Products:
  • RoyalTSX
Versions: All versions before 6.0.2.1
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers specifically when processing SecureGatewayHost objects in RTSZ files with long hostnames during Test Connection.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Potential remote code execution leading to complete system compromise if heap corruption can be weaponized for arbitrary code execution.

🟠

Likely Case

Application crash and denial of service through heap corruption when processing malicious RTSZ files.

🟢

If Mitigated

Limited to application instability if proper input validation and memory protections are in place.

🌐 Internet-Facing: MEDIUM - Requires user interaction (clicking Test Connection) and file delivery, but RTSZ files could be distributed via email or downloads.
🏢 Internal Only: MEDIUM - Similar risk profile internally, though attack surface may be smaller depending on deployment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (victim must click Test Connection) and delivery of malicious RTSZ file. Heap corruption exploitation requires additional weaponization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.2.1

Vendor Advisory: https://www.royalapps.com/go/kb-ts-mac-critical-security-update

Restart Required: Yes

Instructions:

1. Open RoyalTSX. 2. Go to RoyalTSX > Check for Updates. 3. Install version 6.0.2.1 or later. 4. Restart RoyalTSX after installation.

🔧 Temporary Workarounds

Disable Test Connection feature

all

Prevent triggering the vulnerability by avoiding use of Test Connection button on untrusted RTSZ files.

Restrict RTSZ file processing

all

Only open RTSZ files from trusted sources and avoid clicking Test Connection on unfamiliar connections.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of vulnerable RoyalTSX versions
  • Educate users to avoid clicking Test Connection on untrusted RTSZ files and implement file type restrictions

🔍 How to Verify

Check if Vulnerable:

Check RoyalTSX version in application menu (RoyalTSX > About RoyalTSX). If version is below 6.0.2.1, system is vulnerable.

Check Version:

Not applicable - check via GUI in RoyalTSX > About RoyalTSX

Verify Fix Applied:

Verify version is 6.0.2.1 or higher in About RoyalTSX dialog after update.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from RoyalTSX
  • Unexpected termination of RoyalTSX process

Network Indicators:

  • Unusual outbound connections after processing RTSZ files if weaponized

SIEM Query:

source="RoyalTSX" AND (event_type="crash" OR event_type="termination")

🔗 References

📤 Share & Export