CVE-2025-0412

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Luxion KeyShot Viewer installations by tricking users into opening malicious KSP files. Attackers can gain control of the affected system with the same privileges as the current user. All users of vulnerable KeyShot Viewer versions are affected.

💻 Affected Systems

Products:
  • Luxion KeyShot Viewer
Versions: Versions prior to the patched release
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. User interaction required (opening malicious KSP file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's machine, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to data exfiltration, malware installation, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact if proper application sandboxing, least privilege principles, and network segmentation are implemented, though data loss is still possible.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://download.keyshot.com/cert/lsa-960930/lsa-960930.pdf?version=1.0

Restart Required: No

Instructions:

1. Visit the Luxion KeyShot website
2. Download the latest version of KeyShot Viewer
3. Install the update following vendor instructions
4. Verify installation by checking version number

🔧 Temporary Workarounds

Block KSP file extensions

all

Prevent execution of KSP files at the email gateway or endpoint protection level

User awareness training

all

Educate users not to open KSP files from untrusted sources

🧯 If You Can't Patch

  • Disable KeyShot Viewer entirely and use alternative software
  • Implement application whitelisting to prevent unauthorized execution of KeyShot Viewer

🔍 How to Verify

Check if Vulnerable:

Check KeyShot Viewer version against vendor advisory. If using version prior to patched release, system is vulnerable.

Check Version:

Open KeyShot Viewer and check 'About' menu or Help > About

Verify Fix Applied:

Verify KeyShot Viewer version matches or exceeds the patched version specified in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from KeyShot Viewer
  • Memory access violations in application logs
  • Failed file parsing attempts

Network Indicators:

  • Outbound connections from KeyShot Viewer to unknown IPs
  • Unusual network traffic patterns following KSP file opening

SIEM Query:

process_name:"KeyShot Viewer" AND (event_type:"process_creation" OR event_type:"memory_access_violation")

🔗 References

📤 Share & Export