CVE-2025-1046: CWE-416: Use After Free in Luxion KeyShot
Luxion KeyShot SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23646.
AI Analysis
Technical Summary
CVE-2025-1046 is a use-after-free vulnerability identified in Luxion KeyShot, specifically affecting version 2024 13.0.0 Build 92 4.10.171. KeyShot is a widely used 3D rendering and animation software, often employed in design, engineering, and manufacturing industries for creating photorealistic visuals. The vulnerability arises during the parsing of SKP files, a file format commonly associated with 3D models. The core issue is that the software fails to validate the existence of an object before performing operations on it, leading to a use-after-free condition. This memory management flaw allows an attacker to manipulate the program's memory, potentially leading to arbitrary code execution within the context of the KeyShot process. Exploitation requires user interaction, such as opening a malicious SKP file or visiting a web page that triggers the vulnerability through embedded content. Although no public exploits are currently known, the vulnerability's nature poses a significant risk because it enables remote code execution without requiring elevated privileges or complex conditions. The flaw was reported under the Zero Day Initiative (ZDI) as ZDI-CAN-23646 and is categorized under CWE-416, which pertains to use-after-free errors that can lead to memory corruption and execution of arbitrary code.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for sectors heavily reliant on 3D modeling and rendering software such as automotive, aerospace, industrial design, and architecture. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to unauthorized access, data theft, or disruption of critical design workflows. This could compromise intellectual property, delay project timelines, and damage reputations. Since KeyShot is used in collaborative environments, a compromised system could serve as a pivot point for lateral movement within corporate networks. The requirement for user interaction means that social engineering or phishing campaigns could be leveraged to deliver malicious SKP files or lure users to malicious websites. Given the medium severity, the threat is not immediately critical but still warrants prompt attention to prevent exploitation, especially in environments where KeyShot is integrated into production pipelines or where sensitive design data is handled.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit their environments to identify installations of Luxion KeyShot version 2024 13.0.0 Build 92 4.10.171 and prioritize patching once an official update is released by Luxion. 2) Implement strict file handling policies that restrict the opening of SKP files from untrusted or external sources, including disabling automatic loading of SKP files from email attachments or web downloads. 3) Employ endpoint protection solutions capable of detecting anomalous behaviors associated with memory corruption exploits, such as unusual process injections or code executions within KeyShot. 4) Conduct user awareness training focused on the risks of opening files from unknown sources and recognizing phishing attempts that may deliver malicious SKP files. 5) Utilize application whitelisting and sandboxing techniques to isolate KeyShot processes, limiting the potential impact of any exploitation. 6) Monitor network traffic for unusual outbound connections from systems running KeyShot, which could indicate exploitation attempts or data exfiltration. 7) Engage with Luxion support channels to receive timely updates and advisories related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Finland, Austria
CVE-2025-1046: CWE-416: Use After Free in Luxion KeyShot
Description
Luxion KeyShot SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23646.
AI-Powered Analysis
Technical Analysis
CVE-2025-1046 is a use-after-free vulnerability identified in Luxion KeyShot, specifically affecting version 2024 13.0.0 Build 92 4.10.171. KeyShot is a widely used 3D rendering and animation software, often employed in design, engineering, and manufacturing industries for creating photorealistic visuals. The vulnerability arises during the parsing of SKP files, a file format commonly associated with 3D models. The core issue is that the software fails to validate the existence of an object before performing operations on it, leading to a use-after-free condition. This memory management flaw allows an attacker to manipulate the program's memory, potentially leading to arbitrary code execution within the context of the KeyShot process. Exploitation requires user interaction, such as opening a malicious SKP file or visiting a web page that triggers the vulnerability through embedded content. Although no public exploits are currently known, the vulnerability's nature poses a significant risk because it enables remote code execution without requiring elevated privileges or complex conditions. The flaw was reported under the Zero Day Initiative (ZDI) as ZDI-CAN-23646 and is categorized under CWE-416, which pertains to use-after-free errors that can lead to memory corruption and execution of arbitrary code.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for sectors heavily reliant on 3D modeling and rendering software such as automotive, aerospace, industrial design, and architecture. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to unauthorized access, data theft, or disruption of critical design workflows. This could compromise intellectual property, delay project timelines, and damage reputations. Since KeyShot is used in collaborative environments, a compromised system could serve as a pivot point for lateral movement within corporate networks. The requirement for user interaction means that social engineering or phishing campaigns could be leveraged to deliver malicious SKP files or lure users to malicious websites. Given the medium severity, the threat is not immediately critical but still warrants prompt attention to prevent exploitation, especially in environments where KeyShot is integrated into production pipelines or where sensitive design data is handled.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit their environments to identify installations of Luxion KeyShot version 2024 13.0.0 Build 92 4.10.171 and prioritize patching once an official update is released by Luxion. 2) Implement strict file handling policies that restrict the opening of SKP files from untrusted or external sources, including disabling automatic loading of SKP files from email attachments or web downloads. 3) Employ endpoint protection solutions capable of detecting anomalous behaviors associated with memory corruption exploits, such as unusual process injections or code executions within KeyShot. 4) Conduct user awareness training focused on the risks of opening files from unknown sources and recognizing phishing attempts that may deliver malicious SKP files. 5) Utilize application whitelisting and sandboxing techniques to isolate KeyShot processes, limiting the potential impact of any exploitation. 6) Monitor network traffic for unusual outbound connections from systems running KeyShot, which could indicate exploitation attempts or data exfiltration. 7) Engage with Luxion support channels to receive timely updates and advisories related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2025-02-04T21:01:30.574Z
- Cisa Enriched
- true
Threat ID: 682d9843c4522896dcbf3161
Added to database: 5/21/2025, 9:09:23 AM
Last enriched: 6/23/2025, 7:20:15 AM
Last updated: 7/29/2025, 8:40:55 PM
Views: 11
Related Threats
CVE-2025-49568: Use After Free (CWE-416) in Adobe Illustrator
MediumCVE-2025-49567: NULL Pointer Dereference (CWE-476) in Adobe Illustrator
MediumCVE-2025-49564: Stack-based Buffer Overflow (CWE-121) in Adobe Illustrator
HighCVE-2025-49563: Out-of-bounds Write (CWE-787) in Adobe Illustrator
HighCVE-2025-32086: Escalation of Privilege in Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.