Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11580: CWE-122: Heap-based Buffer Overflow in Luxion KeyShot

0
High
VulnerabilityCVE-2024-11580cvecve-2024-11580cwe-122
Published: Fri Nov 22 2024 (11/22/2024, 20:44:02 UTC)
Source: CVE Database V5
Vendor/Project: Luxion
Product: KeyShot

Description

CVE-2024-11580 is a high-severity heap-based buffer overflow vulnerability in Luxion KeyShot 2024 version 13. 0. 0 Build 92 4. 10. 171. The flaw exists in the parsing of abc files due to improper validation of user-supplied data length before copying to a heap buffer. Exploitation requires user interaction, such as opening a malicious file or visiting a malicious page, allowing remote attackers to execute arbitrary code in the context of the current process. The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 7. 8. No known exploits are currently in the wild.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:41:31 UTC

Technical Analysis

CVE-2024-11580 is a heap-based buffer overflow vulnerability identified in Luxion KeyShot, specifically affecting version 2024 13.0.0 Build 92 4.10.171. The vulnerability arises from inadequate validation of the length of user-supplied data during the parsing of abc files, which are presumably used for 3D model or scene data within KeyShot. When a maliciously crafted abc file is processed, the unchecked data length leads to a buffer overflow on the heap, enabling an attacker to overwrite memory and execute arbitrary code within the context of the KeyShot process. Exploitation requires user interaction, such as opening a malicious abc file or visiting a malicious webpage that triggers the file parsing. The vulnerability does not require prior authentication and has low attack complexity, but user interaction is mandatory. The CVSS v3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability. The issue was reported by ZDI (ZDI-CAN-23700) and is publicly disclosed with no known active exploits at this time. The lack of a patch link suggests that a fix may be pending or recently released. This vulnerability falls under CWE-122, a common class of memory corruption bugs that are frequently exploited for remote code execution.

Potential Impact

The impact of CVE-2024-11580 is significant for organizations using the affected version of Luxion KeyShot, particularly those in industries relying on 3D rendering and visualization such as manufacturing, automotive, product design, and media. Successful exploitation allows remote attackers to execute arbitrary code, potentially leading to full system compromise, data theft, or disruption of rendering workflows. Since KeyShot often runs on workstations with access to sensitive design files and intellectual property, this vulnerability could lead to exposure of proprietary information or sabotage of design processes. The requirement for user interaction limits mass exploitation but targeted attacks via phishing or malicious file distribution remain a realistic threat. The vulnerability also poses risks to supply chain security if compromised files propagate through collaborative environments. Availability may be impacted if attackers deploy destructive payloads or ransomware. Overall, the vulnerability threatens confidentiality, integrity, and availability of affected systems and data.

Mitigation Recommendations

To mitigate CVE-2024-11580, organizations should immediately restrict the opening of abc files from untrusted or unknown sources and educate users about the risks of opening files from suspicious emails or websites. Implement application whitelisting and sandboxing for KeyShot to limit the impact of potential exploitation. Network-level controls such as blocking access to malicious domains and scanning inbound files with updated antivirus and endpoint detection solutions can reduce exposure. Monitor KeyShot processes for anomalous behavior indicative of exploitation attempts. Since no official patch link is provided, maintain close communication with Luxion for timely updates and apply patches as soon as they become available. Additionally, consider isolating KeyShot workstations from critical network segments to limit lateral movement in case of compromise. Employing file integrity monitoring on design files and backups will help detect and recover from attacks. Finally, enforce the principle of least privilege on user accounts running KeyShot to minimize damage from code execution.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-11-20T22:00:55.421Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6e18b7ef31ef0b595105

Added to database: 2/25/2026, 9:48:08 PM

Last enriched: 2/26/2026, 6:41:31 AM

Last updated: 2/26/2026, 7:43:57 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats