CVE-2024-13045
📋 TL;DR
A stack-based buffer overflow vulnerability in Ashlar-Vellum Cobalt's AR file parser allows remote attackers to execute arbitrary code when a user opens a malicious AR file or visits a malicious webpage. This affects all users of vulnerable Ashlar-Vellum Cobalt installations. Successful exploitation gives attackers control over the affected system.
💻 Affected Systems
- Ashlar-Vellum Cobalt
📦 What is this software?
Cobalt by Ashlar
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control, data theft, ransomware deployment, and lateral movement within the network.
Likely Case
Malware installation leading to data exfiltration, credential theft, and persistence establishment on the compromised system.
If Mitigated
Limited impact with proper application sandboxing and user privilege restrictions, potentially only crashing the application.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file). The vulnerability is straightforward to exploit once the file format is understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched version
Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1729/
Restart Required: Yes
Instructions:
1. Check Ashlar-Vellum website for security updates
2. Download and install the latest version of Cobalt
3. Restart the application and system if required
4. Verify the patch is applied correctly
🔧 Temporary Workarounds
Disable AR file association
allRemove AR file type association with Cobalt to prevent automatic opening
Windows: assoc .ar=
macOS: Remove AR file association in Finder preferences
Application sandboxing
allRun Cobalt in restricted mode or sandbox to limit damage if exploited
Windows: Use AppLocker or Windows Sandbox
macOS: Use sandbox-exec or built-in sandboxing
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Cobalt systems
- Use application whitelisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check Cobalt version against vendor advisory. If using unpatched version, assume vulnerable.
Check Version:
Windows: Check Help > About in Cobalt application. macOS: Check application version in Finder Get Info.
Verify Fix Applied:
Verify installed version matches or exceeds patched version from vendor advisory.
📡 Detection & Monitoring
Log Indicators:
- Cobalt application crashes with memory access violations
- Unexpected child processes spawned from Cobalt
- Network connections from Cobalt to suspicious IPs
Network Indicators:
- Outbound connections from Cobalt to unknown external IPs
- Unusual data exfiltration patterns
SIEM Query:
process_name:"Cobalt.exe" AND (event_id:1000 OR event_id:1001) OR process_parent:"Cobalt.exe" AND process_name NOT IN (allowed_process_list)