Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13048: CWE-787: Out-of-bounds Write in Ashlar-Vellum Cobalt

0
High
VulnerabilityCVE-2024-13048cvecve-2024-13048cwe-787
Published: Mon Dec 30 2024 (12/30/2024, 20:16:05 UTC)
Source: CVE Database V5
Vendor/Project: Ashlar-Vellum
Product: Cobalt

Description

Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24844.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 01:57:46 UTC

Technical Analysis

CVE-2024-13048 is an out-of-bounds write vulnerability classified under CWE-787, affecting Ashlar-Vellum Cobalt version 1204.90. The flaw arises from improper validation during the parsing of XE files, which are specific to the Ashlar-Vellum Cobalt software suite. When processing a specially crafted XE file, the software writes data beyond the allocated buffer boundaries, leading to memory corruption. This memory corruption can be exploited by remote attackers to execute arbitrary code within the context of the vulnerable application process. The attack vector requires user interaction, such as opening a malicious XE file or visiting a malicious webpage that triggers the file parsing. The vulnerability has a CVSS 3.0 base score of 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The impact includes full compromise of confidentiality, integrity, and availability of the affected system through arbitrary code execution. No patches or mitigations have been officially released at the time of publication, and no active exploitation has been reported. The vulnerability was assigned and disclosed by the Zero Day Initiative (ZDI) under the identifier ZDI-CAN-24844.

Potential Impact

The vulnerability enables remote code execution in Ashlar-Vellum Cobalt, potentially allowing attackers to take full control of affected systems. This can lead to unauthorized access to sensitive design files, intellectual property theft, and disruption of design workflows. The arbitrary code execution could be leveraged to install malware, ransomware, or pivot within internal networks. Since exploitation requires user interaction, social engineering or phishing campaigns could be used to deliver malicious XE files. Organizations relying on Ashlar-Vellum Cobalt for CAD or design tasks face risks of operational disruption and data breaches. The lack of patches increases exposure until mitigations or updates are available. The impact extends to confidentiality, integrity, and availability, making this a critical concern for industries such as manufacturing, engineering, and product design where Ashlar-Vellum products are used.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict controls on the handling of XE files, including blocking or quarantining XE files from untrusted sources. Employ application whitelisting to restrict execution of unauthorized files and monitor file access patterns for anomalies. Educate users about the risks of opening files from unknown or suspicious origins to reduce the likelihood of successful social engineering. Use endpoint detection and response (EDR) tools to detect unusual behavior indicative of exploitation attempts. Network segmentation can limit the spread of an attacker if compromise occurs. Regularly check vendor communications for patches or updates and apply them promptly once available. Consider sandboxing or opening XE files in isolated environments to prevent system-wide impact. Maintain up-to-date backups to recover from potential ransomware or destructive payloads delivered via this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-12-30T16:46:58.656Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6e4cb7ef31ef0b59c7ec

Added to database: 2/25/2026, 9:49:00 PM

Last enriched: 2/26/2026, 1:57:46 AM

Last updated: 4/11/2026, 9:21:56 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses