CVE-2025-1047

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Luxion KeyShot installations by tricking users into opening malicious PVS files. Attackers can gain control of the affected system through uninitialized pointer access during file parsing. All users of vulnerable KeyShot versions are affected.

💻 Affected Systems

Products:
  • Luxion KeyShot
Versions: Specific versions not detailed in provided references; check vendor advisory for exact affected versions
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with vulnerable versions are affected regardless of configuration. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the workstation, enabling data theft, lateral movement, and persistence.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or ransomware deployment on the affected system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only affecting the current user session.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability is documented by ZDI, suggesting potential for weaponization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://download.keyshot.com/cert/ksa-113962/ksa-113962.pdf

Restart Required: Yes

Instructions:

1. Download latest KeyShot version from official vendor site
2. Install update following vendor instructions
3. Restart system to ensure patch is fully applied

🔧 Temporary Workarounds

Restrict PVS file handling

all

Block or restrict opening of .pvs files through application controls or group policy

Application sandboxing

all

Run KeyShot in restricted/sandboxed environment to limit potential damage

🧯 If You Can't Patch

  • Implement strict file handling policies to prevent opening untrusted PVS files
  • Isolate KeyShot workstations from critical network segments and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check KeyShot version against vendor advisory; if using affected version and can open PVS files, system is vulnerable

Check Version:

Launch KeyShot and check 'Help > About' menu for version information

Verify Fix Applied:

Verify KeyShot version is updated to patched version specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from KeyShot executable
  • Memory access violations or crashes in KeyShot process logs
  • Unexpected network connections from KeyShot process

Network Indicators:

  • Outbound connections from KeyShot to unexpected destinations
  • DNS requests for suspicious domains following KeyShot execution

SIEM Query:

Process Creation where Parent Process contains 'KeyShot' AND (Command Line contains '.pvs' OR Image contains suspicious patterns)

🔗 References

📤 Share & Export