CVE-2025-9274

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Oxford Instruments Imaris Viewer. Attackers can exploit this by tricking users into opening malicious IMS files or visiting malicious web pages. Users of Imaris Viewer are affected.

💻 Affected Systems

Products:
  • Oxford Instruments Imaris Viewer
Versions: Specific versions not disclosed in available references; likely multiple versions prior to patch
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations that process IMS files are vulnerable. User interaction required (opening malicious file or visiting malicious page).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malware installation, data exfiltration, or system disruption through code execution in the context of the Imaris Viewer process.

🟢

If Mitigated

Limited impact due to application sandboxing, low-privilege user accounts, or network segmentation preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (social engineering). The vulnerability is in uninitialized pointer access during IMS file parsing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Oxford Instruments security advisory for specific patched version

Vendor Advisory: https://www.oxinst.com/security-advisories

Restart Required: Yes

Instructions:

1. Check current Imaris Viewer version
2. Visit Oxford Instruments support portal
3. Download and install latest patched version
4. Restart system

🔧 Temporary Workarounds

Disable IMS file association

all

Prevent Imaris Viewer from automatically opening IMS files

Windows: Use 'Default Apps' settings to change IMS file association
macOS: Use 'Get Info' on IMS files to change default application
Linux: Update .desktop file associations

Application sandboxing

all

Run Imaris Viewer in restricted environment

Windows: Use AppLocker or Windows Sandbox
macOS: Use sandbox-exec or create restricted profile
Linux: Use Firejail or SELinux/AppArmor policies

🧯 If You Can't Patch

  • Implement network segmentation to isolate Imaris Viewer systems
  • Use application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check Imaris Viewer version against Oxford Instruments security advisory. If using unpatched version, assume vulnerable.

Check Version:

Windows: Check Help > About in Imaris Viewer GUI
macOS/Linux: Check application info or package manager

Verify Fix Applied:

Verify installed version matches or exceeds patched version specified in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Imaris Viewer
  • IMS file access from untrusted sources
  • Crash reports from Imaris Viewer

Network Indicators:

  • Outbound connections from Imaris Viewer to unknown IPs
  • Downloads of IMS files from external sources

SIEM Query:

process_name:"Imaris Viewer" AND (event_type:process_creation OR file_type:".ims")

🔗 References

📤 Share & Export