Skip to main content

CVE-2025-1046: CWE-416: Use After Free in Luxion KeyShot

Medium
VulnerabilityCVE-2025-1046cvecve-2025-1046cwe-416-use-after-free
Published: Wed Apr 23 2025 (04/23/2025, 16:43:48 UTC)
Source: CVE
Vendor/Project: Luxion
Product: KeyShot

Description

Luxion KeyShot SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23646.

AI-Powered Analysis

AILast updated: 06/23/2025, 07:20:15 UTC

Technical Analysis

CVE-2025-1046 is a use-after-free vulnerability identified in Luxion KeyShot, specifically affecting version 2024 13.0.0 Build 92 4.10.171. KeyShot is a widely used 3D rendering and animation software, often employed in design, engineering, and manufacturing industries for creating photorealistic visuals. The vulnerability arises during the parsing of SKP files, a file format commonly associated with 3D models. The core issue is that the software fails to validate the existence of an object before performing operations on it, leading to a use-after-free condition. This memory management flaw allows an attacker to manipulate the program's memory, potentially leading to arbitrary code execution within the context of the KeyShot process. Exploitation requires user interaction, such as opening a malicious SKP file or visiting a web page that triggers the vulnerability through embedded content. Although no public exploits are currently known, the vulnerability's nature poses a significant risk because it enables remote code execution without requiring elevated privileges or complex conditions. The flaw was reported under the Zero Day Initiative (ZDI) as ZDI-CAN-23646 and is categorized under CWE-416, which pertains to use-after-free errors that can lead to memory corruption and execution of arbitrary code.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for sectors heavily reliant on 3D modeling and rendering software such as automotive, aerospace, industrial design, and architecture. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to unauthorized access, data theft, or disruption of critical design workflows. This could compromise intellectual property, delay project timelines, and damage reputations. Since KeyShot is used in collaborative environments, a compromised system could serve as a pivot point for lateral movement within corporate networks. The requirement for user interaction means that social engineering or phishing campaigns could be leveraged to deliver malicious SKP files or lure users to malicious websites. Given the medium severity, the threat is not immediately critical but still warrants prompt attention to prevent exploitation, especially in environments where KeyShot is integrated into production pipelines or where sensitive design data is handled.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit their environments to identify installations of Luxion KeyShot version 2024 13.0.0 Build 92 4.10.171 and prioritize patching once an official update is released by Luxion. 2) Implement strict file handling policies that restrict the opening of SKP files from untrusted or external sources, including disabling automatic loading of SKP files from email attachments or web downloads. 3) Employ endpoint protection solutions capable of detecting anomalous behaviors associated with memory corruption exploits, such as unusual process injections or code executions within KeyShot. 4) Conduct user awareness training focused on the risks of opening files from unknown sources and recognizing phishing attempts that may deliver malicious SKP files. 5) Utilize application whitelisting and sandboxing techniques to isolate KeyShot processes, limiting the potential impact of any exploitation. 6) Monitor network traffic for unusual outbound connections from systems running KeyShot, which could indicate exploitation attempts or data exfiltration. 7) Engage with Luxion support channels to receive timely updates and advisories related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-02-04T21:01:30.574Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf3161

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 7:20:15 AM

Last updated: 7/29/2025, 8:40:55 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats