In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77), the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to exec
In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77), the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
| Vendor | Product | Versions |
|---|---|---|
| Ashlar-Vellum | Cobalt | v12 SP0 Build (1204.77) |
| Ashlar-Vellum | Xenon | v12 SP0 Build (1204.77) |
| Ashlar-Vellum | Argon | v12 SP0 Build (1204.77) |
| Ashlar-Vellum | Lithium | v12 SP0 Build (1204.77) |
| Ashlar-Vellum | Cobalt Share | v12 SP0 Build (1204.77) |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.