CVE-2023-54330

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical remote stack-based buffer overflow vulnerability in Inbit Messenger versions 4.6.0 to 4.9.0. Unauthenticated attackers can send specially crafted network packets to execute arbitrary code on vulnerable Windows systems. Organizations running affected versions of Inbit Messenger are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Inbit Messenger
Versions: 4.6.0 to 4.9.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the vulnerable version range are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Remote code execution leading to malware installation, backdoor persistence, and credential theft from the compromised system.

🟢

If Mitigated

Attack blocked at network perimeter with no internal systems exposed; minimal impact if proper segmentation exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires no authentication; attackers can easily weaponize this vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check current Inbit Messenger version. 2. If version is between 4.6.0 and 4.9.0, immediately uninstall the software. 3. Consider alternative messaging solutions as vendor patch status is unknown.

🔧 Temporary Workarounds

Network Segmentation

all

Block all inbound network traffic to Inbit Messenger ports at firewall/network perimeter

Application Whitelisting

windows

Implement application control to prevent execution of unauthorized code

🧯 If You Can't Patch

  • Immediately isolate affected systems from network access
  • Deploy endpoint detection and response (EDR) solutions with behavioral monitoring

🔍 How to Verify

Check if Vulnerable:

Check Inbit Messenger version in Help > About menu; if version is 4.6.0, 4.7.0, 4.8.0, or 4.9.0, system is vulnerable.

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Verify Inbit Messenger is completely uninstalled or upgraded to version above 4.9.0 (if available).

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections to Inbit Messenger ports
  • Process creation anomalies from messenger.exe
  • SEH overwrite exceptions in Windows event logs

Network Indicators:

  • Malformed packets to Inbit Messenger default ports
  • Unusual payload patterns in network traffic to messenger service

SIEM Query:

source="windows" AND (event_id=4625 OR event_id=4688) AND process_name="messenger.exe" AND (command_line CONTAINS "-malicious" OR parent_process CONTAINS "suspicious")

🔗 References

📤 Share & Export