Ashlar-Vellum’s Vulnerability Circus: Out-of-Bounds Shenanigans Await!
Attention, Ashlar-Vellum users! Before your Cobalt, Xenon, Argon, Lithium, or Cobalt Share goes rogue, update your software to version 12.6.1204.204, or risk an out-of-bounds adventure. The vulnerabilities could allow attackers to execute arbitrary code. View CSAF for a thrilling look at how these bugs could turn your devices into uninvited performers.

Hot Take:
Looks like Ashlar-Vellum’s products are having a bit of an identity crisis—trying to decide whether they’re cutting-edge design software or a hacker’s dream come true! With vulnerabilities ranging from out-of-bounds reads and writes to heap-based buffer overflows, it’s like a buffet of bugs for the cybercriminal elite. Time to patch up and get back to drawing board basics, folks!
Key Points:
- Affected products include Cobalt, Xenon, Argon, Lithium, and Cobalt Share.
- Vulnerabilities involve out-of-bounds write/read and heap-based buffer overflow.
- Exploitation can lead to information disclosure and arbitrary code execution.
- Products should be updated to version 12.6.1204.204 or later.
- No known public exploitation reported, but precautions are advised.
Already a member? Log in here