CVE-2025-7268

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plugin. The flaw exists in improper buffer validation during DXF parsing, enabling out-of-bounds reads that can lead to remote code execution. Users of IrfanView with the CADImage plugin are affected.

💻 Affected Systems

Products:
  • IrfanView CADImage Plugin
Versions: Versions prior to the fix (specific version unknown from provided data)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the CADImage plugin to be installed and enabled in IrfanView. DXF file association with IrfanView increases risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the user running IrfanView, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Malware installation or data exfiltration when users open malicious DXF files from untrusted sources.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only causing application crashes.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but these could be delivered via email, downloads, or compromised websites.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared network drives containing malicious DXF files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious DXF file. The vulnerability is documented by ZDI (ZDI-CAN-26182) suggesting research exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version - check IrfanView updates

Vendor Advisory: https://www.irfanview.com/

Restart Required: Yes

Instructions:

1. Open IrfanView
2. Go to Help → Check for Updates
3. Download and install latest version
4. Restart IrfanView

🔧 Temporary Workarounds

Disable CADImage Plugin

windows

Remove or disable the vulnerable CADImage plugin from IrfanView

Navigate to IrfanView plugins folder and remove or rename CADImage.dll

Change DXF File Association

windows

Change default program for DXF files to a different application

Right-click DXF file → Open With → Choose Another App → Select different program

🧯 If You Can't Patch

  • Run IrfanView with restricted user privileges (not as administrator)
  • Implement application whitelisting to block IrfanView execution

🔍 How to Verify

Check if Vulnerable:

Check IrfanView version and verify if CADImage plugin is installed/enabled

Check Version:

Open IrfanView → Help → About IrfanView

Verify Fix Applied:

Confirm IrfanView is updated to latest version and CADImage plugin version is updated

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs with memory access violations
  • Unexpected IrfanView processes spawning child processes

Network Indicators:

  • IrfanView making unexpected outbound connections after opening DXF files

SIEM Query:

Process Creation where Image contains 'i_view' AND Parent Process is user-initiated AND Command Line contains '.dxf'

🔗 References

📤 Share & Export