CVE-2017-20211
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-12

Last updated on: 2025-11-12

Assigner: VulnCheck

Description
UCanCode E-XD++ Visualization Enterprise Suite contains an untrusted pointer dereference vulnerability via the TKDRAWCAD.TKDrawCADCtrl.1 ActiveX control. This is because it exposes a RotateShape method that dereferences a user-supplied pointer without sufficient validation. A crafted input may cause the control to dereference an attacker-controlled pointer, enabling remote code execution in the context of the hosting process. The vulnerability requires user interaction (instantiation of the ActiveX control via a web page or a file).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-12
Last Modified
2025-11-12
Generated
2026-05-07
AI Q&A
2025-11-13
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ucancode e-xd++_visualization_enterprise_suite 4.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-823 The product performs pointer arithmetic on a valid pointer, but it uses an offset that can point outside of the intended range of valid memory locations for the resulting pointer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the UCanCode E-XD++ Visualization Enterprise Suite's ActiveX control TKDRAWCAD.TKDrawCADCtrl.1. It involves an untrusted pointer dereference through the RotateShape method, which dereferences a user-supplied pointer without proper validation. An attacker can craft input that causes the control to dereference a pointer they control, potentially leading to remote code execution within the context of the hosting process. Exploitation requires user interaction, such as instantiating the ActiveX control via a web page or file.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute arbitrary code remotely on the affected system with the privileges of the hosting process. This could lead to system compromise, data theft, or further attacks within the network. Since it requires user interaction, the attacker might trick a user into opening a malicious web page or file to trigger the exploit.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart