Skip to main content

CVE-2025-2098: CWE-732 Incorrect Permission Assignment for Critical Resource in Beijing Honghu Yuntu Technology Fast CAD Reader

High
VulnerabilityCVE-2025-2098cvecve-2025-2098cwe-732
Published: Wed Mar 26 2025 (03/26/2025, 15:23:42 UTC)
Source: CVE Database V5
Vendor/Project: Beijing Honghu Yuntu Technology
Product: Fast CAD Reader

Description

Fast CAD Reader application on MacOS was found to be installed with incorrect file permissions (rwxrwxrwx). This is inconsistent with standard macOS security practices, where applications should have drwxr-xr-x permissions. Incorrect permissions allow for Dylib Hijacking. Guest account, other users and applications can exploit this vulnerability for privilege escalation. This issue affects Fast CAD Reader in possibly all versions since the vendor has not responded to our messages. The tested version was 4.1.5

AI-Powered Analysis

AILast updated: 10/03/2025, 16:42:21 UTC

Technical Analysis

CVE-2025-2098 is a high-severity vulnerability affecting the Fast CAD Reader application developed by Beijing Honghu Yuntu Technology, specifically on macOS platforms. The core issue stems from incorrect file permission assignments on the application installation directory or critical resources, where permissions are set to rwxrwxrwx (777) instead of the more restrictive and standard drwxr-xr-x (755). This overly permissive setting allows any user, including guest accounts and other non-privileged users or applications, to modify or replace dynamic libraries (Dylibs) used by the application. This misconfiguration opens the door to Dylib Hijacking, a technique where an attacker places a malicious dynamic library in a location where the application loads it, leading to arbitrary code execution with the privileges of the application. Since Fast CAD Reader runs with user-level privileges, this vulnerability can be exploited to escalate privileges on the system, potentially allowing attackers to execute arbitrary code, manipulate CAD files, or gain further access to the system. The vulnerability does not require user interaction and has a low attack complexity, but it does require local access (AV:L) and some privileges (PR:L). The vendor has not responded to vulnerability reports, and no patches are currently available. The tested version is 4.1.5, but all versions may be affected. The CVSS 4.0 score of 8.4 reflects the high impact on confidentiality and integrity, with a significant scope of vulnerability due to the permissive file permissions and the potential for privilege escalation via Dylib Hijacking.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Fast CAD Reader for handling CAD files on macOS systems. The ability for low-privileged or guest users to escalate privileges could lead to unauthorized access to sensitive design data, intellectual property theft, or sabotage of critical engineering files. This could disrupt operations in industries such as manufacturing, architecture, and engineering, where CAD data integrity and confidentiality are paramount. Additionally, compromised systems could serve as footholds for lateral movement within corporate networks, increasing the risk of broader compromise. The lack of vendor response and patches exacerbates the risk, as organizations must rely on mitigations rather than fixes. The vulnerability's exploitation could also lead to compliance issues under European data protection regulations if sensitive data is exposed or integrity is compromised.

Mitigation Recommendations

European organizations should implement several specific mitigations: 1) Immediately audit file and directory permissions of Fast CAD Reader installations on all macOS endpoints to ensure they conform to secure standards (e.g., drwxr-xr-x). 2) Manually correct permissions to restrict write access to only trusted administrators, removing write permissions from guest and other non-privileged users. 3) Employ macOS security features such as System Integrity Protection (SIP) and mandatory access controls to limit unauthorized modifications to application directories. 4) Restrict or disable guest accounts and untrusted local user accounts to reduce the attack surface. 5) Monitor filesystem changes in the application directories for unauthorized modifications indicative of hijacking attempts. 6) Consider isolating Fast CAD Reader usage to dedicated, hardened macOS environments or virtual machines where possible. 7) Engage with the vendor for updates and monitor for any future patches or advisories. 8) As a longer-term measure, evaluate alternative CAD readers with better security postures if vendor responsiveness remains absent.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-03-07T15:46:28.447Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dffc4fb7ee07964d95f635

Added to database: 10/3/2025, 4:39:43 PM

Last enriched: 10/3/2025, 4:42:21 PM

Last updated: 10/3/2025, 5:43:48 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats