Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5509: CWE-427: Uncontrolled Search Path Element in Luxion KeyShot

0
High
VulnerabilityCVE-2024-5509cvecve-2024-5509cwe-427
Published: Thu Jun 06 2024 (06/06/2024, 17:51:50 UTC)
Source: CVE Database V5
Vendor/Project: Luxion
Product: KeyShot

Description

CVE-2024-5509 is a high-severity vulnerability in Luxion KeyShot version 2023. 3. 12. 2. 2. 4 that allows remote code execution via uncontrolled search path elements during BIP file parsing. Exploitation requires user interaction, such as opening a malicious BIP file or visiting a crafted webpage. The vulnerability arises because the software loads libraries from insecure locations, enabling attackers to execute arbitrary code with the privileges of the KeyShot process. Although no known exploits are currently in the wild, the impact on confidentiality, integrity, and availability is significant. Organizations using KeyShot in design and rendering workflows are at risk, especially if they handle untrusted files.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:39:17 UTC

Technical Analysis

CVE-2024-5509 is a remote code execution vulnerability classified under CWE-427 (Uncontrolled Search Path Element) affecting Luxion KeyShot version 2023.3.12.2.2.4. The vulnerability is triggered during the parsing of BIP files, which are project files used by KeyShot. The root cause is that KeyShot loads a library from an unsecured or uncontrolled location specified within the BIP file, allowing an attacker to influence the search path. By crafting a malicious BIP file or luring a user to open such a file or visit a malicious webpage, an attacker can cause the application to load a malicious library, resulting in arbitrary code execution within the context of the KeyShot process. This can lead to full compromise of the affected system depending on the privileges of the user running KeyShot. The CVSS v3.0 base score is 7.8, reflecting high severity with attack vector local (user interaction required), low attack complexity, no privileges required, and high impact on confidentiality, integrity, and availability. No public exploits are currently known, but the vulnerability was reported and published by the Zero Day Initiative (ZDI) under identifier ZDI-CAN-22738. The vulnerability highlights the risk of insecure library loading mechanisms in complex software that processes external files.

Potential Impact

The impact of CVE-2024-5509 is substantial for organizations using Luxion KeyShot, particularly in industries relying heavily on 3D rendering and visualization such as automotive design, manufacturing, architecture, and media production. Successful exploitation allows attackers to execute arbitrary code, potentially leading to full system compromise, data theft, or disruption of rendering workflows. Since KeyShot is often used on workstations with access to sensitive intellectual property and design files, compromise could result in significant confidentiality breaches and intellectual property loss. The requirement for user interaction limits mass exploitation but targeted attacks via phishing or malicious file distribution remain a serious threat. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within corporate networks. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially once exploit code becomes publicly available.

Mitigation Recommendations

To mitigate CVE-2024-5509, organizations should implement the following specific measures: 1) Restrict the execution environment by running KeyShot with the least privileges necessary to limit the impact of code execution. 2) Educate users to avoid opening BIP files from untrusted sources or clicking on suspicious links that could deliver malicious files. 3) Employ application whitelisting and endpoint protection solutions capable of detecting and blocking unauthorized library loads or suspicious process behaviors. 4) Monitor file system and process activity for anomalous library loading patterns related to KeyShot. 5) Network segmentation to isolate workstations running KeyShot from sensitive network segments can reduce lateral movement risk. 6) Regularly check for and apply vendor patches or updates addressing this vulnerability once released. 7) Consider sandboxing or running KeyShot in virtualized environments when handling untrusted files. 8) Implement strict file integrity monitoring on directories used by KeyShot for library loading to detect unauthorized changes. These targeted steps go beyond generic advice and focus on controlling the specific attack vector and reducing exploitation likelihood.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-05-29T21:49:37.803Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6be9b7ef31ef0b55c12a

Added to database: 2/25/2026, 9:38:49 PM

Last enriched: 2/26/2026, 2:39:17 AM

Last updated: 2/26/2026, 11:30:58 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats