CVE-2025-7312

7.8 HIGH

📋 TL;DR

This vulnerability in IrfanView's CADImage plugin allows remote attackers to execute arbitrary code when users open malicious DWG files. Attackers can exploit improper buffer validation during DWG parsing to read beyond allocated memory boundaries and gain code execution. Users of IrfanView with the CADImage plugin installed are affected.

💻 Affected Systems

Products:
  • IrfanView CADImage Plugin
Versions: Versions prior to the patched release
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the CADImage plugin to be installed and enabled in IrfanView. The vulnerability is triggered when opening DWG files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash but no code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

User interaction required (opening malicious file). The vulnerability was discovered by ZDI (ZDI-CAN-26398), suggesting potential for weaponization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check IrfanView updates for CADImage plugin patch

Vendor Advisory: https://www.irfanview.com/

Restart Required: Yes

Instructions:

1. Open IrfanView
2. Go to Help > Check for Updates
3. Install all available updates
4. Restart IrfanView

🔧 Temporary Workarounds

Disable CADImage Plugin

windows

Remove or disable the vulnerable CADImage plugin from IrfanView

Navigate to IrfanView plugins directory and remove CADImage.dll or rename to disable

Block DWG File Extensions

windows

Prevent IrfanView from opening DWG files via file association changes

Use Windows Group Policy or registry to remove .dwg association with IrfanView

🧯 If You Can't Patch

  • Implement application whitelisting to prevent IrfanView execution
  • Use endpoint protection with memory protection features enabled

🔍 How to Verify

Check if Vulnerable:

Check IrfanView version and verify CADImage plugin is installed. Open IrfanView > Help > About to see version information.

Check Version:

irfanview.exe /?

Verify Fix Applied:

Verify IrfanView has been updated to latest version and CADImage plugin version is patched.

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs with memory access violations
  • Windows Application Event Logs showing IrfanView failures

Network Indicators:

  • Unusual outbound connections from systems running IrfanView
  • DWG file downloads from untrusted sources

SIEM Query:

Process Creation where Image contains 'i_view' AND CommandLine contains '.dwg'

🔗 References

📤 Share & Export