CVE-2025-2530

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DAE files in Luxion KeyShot. Attackers can gain control of the affected system through uninitialized pointer access during file parsing. All users running vulnerable versions of Luxion KeyShot are affected.

💻 Affected Systems

Products:
  • Luxion KeyShot
Versions: Specific versions not detailed in advisory, but all versions prior to patch are likely affected
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction to open malicious DAE files

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's machine, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to installation of malware, data exfiltration, or persistence mechanisms on the compromised system.

🟢

If Mitigated

Limited impact through application sandboxing or restricted user privileges, potentially resulting in application crash rather than full code execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to deliver malicious DAE files, but technical exploitation is straightforward once file is opened

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Luxion KeyShot latest version

Vendor Advisory: https://www.keyshot.com/support/security-advisories/

Restart Required: No

Instructions:

1. Open Luxion KeyShot
2. Navigate to Help > Check for Updates
3. Follow prompts to install latest version
4. Verify update completed successfully

🔧 Temporary Workarounds

Restrict DAE file handling

all

Configure system to open DAE files with alternative applications or block DAE file execution in KeyShot

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized execution of KeyShot
  • Use network segmentation to isolate KeyShot workstations from critical systems

🔍 How to Verify

Check if Vulnerable:

Check KeyShot version against latest security advisory from Luxion

Check Version:

In KeyShot: Help > About KeyShot

Verify Fix Applied:

Verify KeyShot version is updated to latest release and test with known safe DAE files

📡 Detection & Monitoring

Log Indicators:

  • KeyShot crash logs with memory access violations
  • Unexpected process creation from KeyShot executable

Network Indicators:

  • Unusual outbound connections from KeyShot process
  • File downloads to KeyShot directory from external sources

SIEM Query:

process_name:"KeyShot.exe" AND (event_id:1000 OR event_id:1001) OR process_parent_name:"KeyShot.exe" AND process_name NOT IN (allowed_process_list)

🔗 References

📤 Share & Export