CVE-2025-11465

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Ashlar-Vellum Cobalt installations by tricking users into opening malicious CO files or visiting malicious web pages. The use-after-free flaw in CO file parsing enables code execution in the context of the current process, affecting all users of vulnerable Ashlar-Vellum Cobalt software.

💻 Affected Systems

Products:
  • Ashlar-Vellum Cobalt
Versions: Specific version information not provided in CVE details; likely multiple versions affected
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations that process CO files are vulnerable. User interaction required (opening malicious file or visiting malicious page).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive files and system resources, potentially enabling further attacks on the network.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in only application crash or denial of service.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (social engineering). The vulnerability is publicly disclosed through ZDI advisory ZDI-25-956.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Ashlar-Vellum vendor advisory for specific patched versions

Vendor Advisory: https://www.ashlar.com/security-advisories/

Restart Required: Yes

Instructions:

1. Check Ashlar-Vellum security advisory for CVE-2025-11465
2. Download and install the latest patched version from official vendor sources
3. Restart the application and any related services
4. Verify the patch is applied correctly

🔧 Temporary Workarounds

Disable CO file association

windows

Remove file type association for .co files to prevent automatic opening in vulnerable application

Windows: assoc .co=
Windows: ftype COFile=

Application sandboxing

all

Run Ashlar-Vellum Cobalt in restricted environment with limited privileges

🧯 If You Can't Patch

  • Implement strict file type filtering at email gateways and web proxies to block .co files
  • Educate users about the risks of opening untrusted CO files and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check Ashlar-Vellum Cobalt version against vendor's patched version list. If running unpatched version, assume vulnerable.

Check Version:

Windows: Check Help > About in Ashlar-Vellum Cobalt application interface

Verify Fix Applied:

Verify installed version matches or exceeds the patched version specified in vendor advisory. Test with known safe CO files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing CO files
  • Unexpected child processes spawned from Ashlar-Vellum Cobalt
  • Unusual network connections from the application

Network Indicators:

  • Downloads of .co files from untrusted sources
  • Outbound connections to suspicious IPs following CO file processing

SIEM Query:

Process creation where parent_process contains 'cobalt' AND (process_name contains 'cmd.exe' OR process_name contains 'powershell.exe' OR process_name contains suspicious binaries)

🔗 References

📤 Share & Export