CVE-2023-53875: Cleartext Transmission of Sensitive Information in Gomlab GOM Player
CVE-2023-53875 is a high-severity remote code execution vulnerability in Gomlab GOM Player version 2. 3. 90. 5360. It exploits the Internet Explorer component within the player, allowing attackers to execute arbitrary code via DNS spoofing combined with malicious URL shortcuts and WebDAV techniques. This can lead to a reverse shell with SMB server interaction, enabling attackers to gain control over affected systems. The vulnerability requires no privileges but does require user interaction. No known exploits are currently reported in the wild. European organizations using this version of GOM Player are at risk, especially those with high exposure to multimedia software and legacy Internet Explorer components. Mitigation involves updating the software once patches are available, restricting network access to SMB services, and educating users about suspicious URL shortcuts.
AI Analysis
Technical Summary
CVE-2023-53875 is a remote code execution vulnerability identified in Gomlab's GOM Player version 2.3.90.5360. The flaw resides in the integration of the Internet Explorer component within the player, which can be exploited through DNS spoofing attacks. Attackers can craft malicious URL shortcuts that, when opened by a user, redirect the victim to attacker-controlled resources using WebDAV techniques. This redirection facilitates the execution of a reverse shell that interacts with SMB servers, allowing attackers to execute arbitrary code remotely on the victim's machine. The vulnerability does not require any prior authentication or privileges but does require user interaction to trigger the malicious URL shortcut. The attack vector leverages network-level manipulation (DNS spoofing) combined with client-side exploitation, making it a potent threat in environments where users access untrusted networks or maliciously crafted links. Although no exploits are currently reported in the wild, the complexity of the attack and the reliance on legacy Internet Explorer components embedded in GOM Player increase the risk profile. The CVSS 4.0 score of 7.5 indicates a high severity, primarily due to the potential impact on confidentiality, integrity, and availability, as well as the remote and unauthenticated nature of the attack.
Potential Impact
For European organizations, this vulnerability poses a significant risk of remote system compromise, particularly in environments where GOM Player is widely used for multimedia playback. Successful exploitation can lead to unauthorized access, data exfiltration, lateral movement within networks via SMB interactions, and potential deployment of further malware or ransomware. The reliance on DNS spoofing means that organizations with users frequently connecting to untrusted or public networks are at higher risk. Additionally, the use of legacy Internet Explorer components increases exposure, especially in enterprises with legacy software dependencies. The compromise of endpoints can disrupt business operations, lead to data breaches, and damage organizational reputation. Given the high severity and remote exploitation capability, critical infrastructure sectors, media companies, and enterprises with large multimedia user bases in Europe should be particularly vigilant.
Mitigation Recommendations
1. Immediately audit and inventory all systems running GOM Player version 2.3.90.5360 and restrict or disable its use until a patch is available. 2. Monitor network traffic for unusual DNS activity and implement DNS security measures such as DNSSEC to mitigate spoofing risks. 3. Restrict SMB protocol access on endpoints and network segments to only trusted devices and networks, using firewall rules and network segmentation. 4. Educate users to avoid opening suspicious URL shortcuts or links, especially those received from untrusted sources or over unsecured networks. 5. Employ endpoint detection and response (EDR) solutions to detect anomalous behaviors related to reverse shell activity and SMB interactions. 6. Once available, apply vendor patches promptly and verify the update integrity. 7. Consider disabling or isolating legacy Internet Explorer components embedded within applications if feasible. 8. Conduct regular vulnerability scanning and penetration testing focused on multimedia applications and legacy components.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2023-53875: Cleartext Transmission of Sensitive Information in Gomlab GOM Player
Description
CVE-2023-53875 is a high-severity remote code execution vulnerability in Gomlab GOM Player version 2. 3. 90. 5360. It exploits the Internet Explorer component within the player, allowing attackers to execute arbitrary code via DNS spoofing combined with malicious URL shortcuts and WebDAV techniques. This can lead to a reverse shell with SMB server interaction, enabling attackers to gain control over affected systems. The vulnerability requires no privileges but does require user interaction. No known exploits are currently reported in the wild. European organizations using this version of GOM Player are at risk, especially those with high exposure to multimedia software and legacy Internet Explorer components. Mitigation involves updating the software once patches are available, restricting network access to SMB services, and educating users about suspicious URL shortcuts.
AI-Powered Analysis
Technical Analysis
CVE-2023-53875 is a remote code execution vulnerability identified in Gomlab's GOM Player version 2.3.90.5360. The flaw resides in the integration of the Internet Explorer component within the player, which can be exploited through DNS spoofing attacks. Attackers can craft malicious URL shortcuts that, when opened by a user, redirect the victim to attacker-controlled resources using WebDAV techniques. This redirection facilitates the execution of a reverse shell that interacts with SMB servers, allowing attackers to execute arbitrary code remotely on the victim's machine. The vulnerability does not require any prior authentication or privileges but does require user interaction to trigger the malicious URL shortcut. The attack vector leverages network-level manipulation (DNS spoofing) combined with client-side exploitation, making it a potent threat in environments where users access untrusted networks or maliciously crafted links. Although no exploits are currently reported in the wild, the complexity of the attack and the reliance on legacy Internet Explorer components embedded in GOM Player increase the risk profile. The CVSS 4.0 score of 7.5 indicates a high severity, primarily due to the potential impact on confidentiality, integrity, and availability, as well as the remote and unauthenticated nature of the attack.
Potential Impact
For European organizations, this vulnerability poses a significant risk of remote system compromise, particularly in environments where GOM Player is widely used for multimedia playback. Successful exploitation can lead to unauthorized access, data exfiltration, lateral movement within networks via SMB interactions, and potential deployment of further malware or ransomware. The reliance on DNS spoofing means that organizations with users frequently connecting to untrusted or public networks are at higher risk. Additionally, the use of legacy Internet Explorer components increases exposure, especially in enterprises with legacy software dependencies. The compromise of endpoints can disrupt business operations, lead to data breaches, and damage organizational reputation. Given the high severity and remote exploitation capability, critical infrastructure sectors, media companies, and enterprises with large multimedia user bases in Europe should be particularly vigilant.
Mitigation Recommendations
1. Immediately audit and inventory all systems running GOM Player version 2.3.90.5360 and restrict or disable its use until a patch is available. 2. Monitor network traffic for unusual DNS activity and implement DNS security measures such as DNSSEC to mitigate spoofing risks. 3. Restrict SMB protocol access on endpoints and network segments to only trusted devices and networks, using firewall rules and network segmentation. 4. Educate users to avoid opening suspicious URL shortcuts or links, especially those received from untrusted sources or over unsecured networks. 5. Employ endpoint detection and response (EDR) solutions to detect anomalous behaviors related to reverse shell activity and SMB interactions. 6. Once available, apply vendor patches promptly and verify the update integrity. 7. Consider disabling or isolating legacy Internet Explorer components embedded within applications if feasible. 8. Conduct regular vulnerability scanning and penetration testing focused on multimedia applications and legacy components.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-12-13T14:25:04.999Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69407360d9bcdf3f3d00c3c4
Added to database: 12/15/2025, 8:45:20 PM
Last enriched: 12/22/2025, 9:50:36 PM
Last updated: 2/5/2026, 9:05:03 PM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15551: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in TP-Link Systems Inc. Archer MR200 v5.2
MediumCVE-2026-1962: Improper Access Controls in WeKan
MediumCVE-2026-0106: Elevation of privilege in Google Android
CriticalCVE-2025-12131: CWE-20 Improper Input Validation in silabs.com Simplicity SDK
MediumCVE-2026-25630
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.