CVE-2024-11571

7.8 HIGH

📋 TL;DR

This vulnerability in IrfanView allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files. The flaw exists in DXF file parsing where improper input validation enables out-of-bounds reads that can lead to remote code execution. All users running vulnerable versions of IrfanView are affected.

💻 Affected Systems

Products:
  • IrfanView
Versions: Versions prior to 4.67
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: IrfanView must be installed and configured to handle DXF files. The vulnerability requires user interaction to open a malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system in the context of the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Malicious code execution with user-level privileges, enabling data exfiltration, malware installation, or system disruption.

🟢

If Mitigated

Limited impact with proper application sandboxing, user privilege restrictions, and file type blocking preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once a malicious DXF file is crafted. The vulnerability was discovered by Zero Day Initiative (ZDI-CAN-24895).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IrfanView 4.67 and later

Vendor Advisory: https://www.irfanview.com/main_history.htm

Restart Required: No

Instructions:

1. Download IrfanView 4.67 or later from the official website. 2. Run the installer. 3. Follow installation prompts. 4. Verify the update by checking Help > About.

🔧 Temporary Workarounds

Disable DXF file association

windows

Remove IrfanView as the default handler for DXF files to prevent automatic opening

Control Panel > Default Programs > Set Associations > Find .DXF > Change program

Block DXF files at perimeter

all

Configure email/web gateways to block DXF file attachments

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized IrfanView execution
  • Use Windows Defender Application Control or similar to restrict IrfanView to trusted directories only

🔍 How to Verify

Check if Vulnerable:

Open IrfanView, go to Help > About, check if version is earlier than 4.67

Check Version:

irfanview.exe /?

Verify Fix Applied:

Confirm IrfanView version is 4.67 or later in Help > About

📡 Detection & Monitoring

Log Indicators:

  • IrfanView process crashes with DXF files
  • Unusual process spawning from IrfanView
  • Security event logs showing IrfanView accessing unexpected memory regions

Network Indicators:

  • Downloads of DXF files from untrusted sources
  • Outbound connections from IrfanView process to suspicious IPs

SIEM Query:

Process:IrfanView AND (FileExtension:DXF OR ParentProcess:explorer.exe) AND (EventID:1000 OR EventID:1001)

🔗 References

📤 Share & Export