CVE-2024-13051

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious VC6 files in Ashlar-Vellum Graphite. Attackers can gain control of the affected system through a heap-based buffer overflow during file parsing. Users of Ashlar-Vellum Graphite who open untrusted VC6 files are at risk.

💻 Affected Systems

Products:
  • Ashlar-Vellum Graphite
Versions: Specific version information not provided in CVE description
Operating Systems: Windows (presumed based on typical CAD software deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installations when processing VC6 files. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected machine, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or application compromise leading to data loss, system instability, and potential foothold for further attacks.

🟢

If Mitigated

Application crash or denial of service if exploit attempts are blocked by security controls.

🌐 Internet-Facing: MEDIUM - Requires user interaction (opening malicious file) but can be delivered via email, downloads, or compromised websites.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared network drives containing malicious files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once a malicious file is opened. ZDI-CAN-24977 reference suggests detailed analysis exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1735/

Restart Required: No

Instructions:

Check Ashlar-Vellum website for security updates. Apply any available patches for Graphite software. No specific patch version information provided in available references.

🔧 Temporary Workarounds

Block VC6 file extensions

all

Prevent opening of VC6 files at the system or email gateway level

User awareness training

all

Train users not to open VC6 files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized execution
  • Use endpoint protection with memory protection and exploit prevention capabilities

🔍 How to Verify

Check if Vulnerable:

Check installed version of Ashlar-Vellum Graphite against vendor security advisories

Check Version:

Check via Windows Programs and Features or application About dialog

Verify Fix Applied:

Verify patch installation and test with known safe VC6 files

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening VC6 files
  • Unusual process creation from Graphite executable

Network Indicators:

  • Downloads of VC6 files from untrusted sources
  • Outbound connections after opening VC6 files

SIEM Query:

Process creation where parent_process contains 'graphite' AND (process contains 'cmd' OR process contains 'powershell')

🔗 References

📤 Share & Export