First published: Fri Jun 25 2021(Updated: )
A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. This vulnerability can be exploited to execute arbitrary code
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk Advance Steel | >=2019<2019.1.3 | |
Autodesk Advance Steel | >=2020<2020.1.4 | |
Autodesk Advance Steel | >=2021<2021.1.1 | |
Autodesk Advance Steel | >=2022<2022.0.1 | |
Autodesk Autocad | >=2019<2019.1.3 | |
Autodesk Autocad | >=2020<2020.1.4 | |
Autodesk Autocad | >=2021<2021.1.1 | |
Autodesk Autocad | >=2022<2022.0.1 | |
Autodesk AutoCAD Architecture | >=2019<2019.1.3 | |
Autodesk AutoCAD Architecture | >=2020<2020.1.4 | |
Autodesk AutoCAD Architecture | >=2021<2021.1.1 | |
Autodesk AutoCAD Architecture | >=2022<=2022.0.1 | |
Autodesk AutoCAD Electrical | >=2019<2019.1.3 | |
Autodesk AutoCAD Electrical | >=2020<2020.1.4 | |
Autodesk AutoCAD Electrical | >=2021<2021.1.1 | |
Autodesk AutoCAD Electrical | >=2022<2022.0.1 | |
Autodesk Autocad Lt | >=2019<2019.1.3 | |
Autodesk Autocad Lt | >=2020<2020.1.4 | |
Autodesk Autocad Lt | >=2021<2021.1.1 | |
Autodesk Autocad Lt | >=2022<2022.0.1 | |
Autodesk AutoCAD Map 3D | >=2019<2019.1.3 | |
Autodesk AutoCAD Map 3D | >=2020<2020.1.4 | |
Autodesk AutoCAD Map 3D | >=2021<2021.1.1 | |
Autodesk AutoCAD Map 3D | >=2022<2022.0.1 | |
Autodesk AutoCAD Mechanical | >=2019<2019.1.3 | |
Autodesk AutoCAD Mechanical | >=2020<2020.1.4 | |
Autodesk AutoCAD Mechanical | >=2021<2021.1.1 | |
Autodesk AutoCAD Mechanical | >=2022<2022.0.1 | |
Autodesk AutoCAD MEP | >=2019<2019.1.3 | |
Autodesk AutoCAD MEP | >=2020<2020.1.4 | |
Autodesk AutoCAD MEP | >=2021<2021.1.1 | |
Autodesk AutoCAD MEP | >=2022<2022.0.1 | |
Autodesk AutoCAD Plant 3D | >=2019<2019.1.3 | |
Autodesk AutoCAD Plant 3D | >=2020<2020.1.4 | |
Autodesk AutoCAD Plant 3D | >=2021<2021.1.1 | |
Autodesk AutoCAD Plant 3D | >=2022<2022.0.1 | |
Autodesk Civil 3D | >=2019<2019.1.3 | |
Autodesk Civil 3D | >=2020<2020.1.4 | |
Autodesk Civil 3D | >=2021<2021.1.1 | |
Autodesk Civil 3D | >=2022<2022.0.1 | |
Autodesk Design Review | =2018 | |
Autodesk Design Review | =2018-hotfix | |
Autodesk Design Review | =2018-hotfix2 | |
Autodesk Design Review | =2018-hotfix3 | |
Autodesk Design Review | =2018-hotfix4 | |
ICONICS GENESIS64 | <=10.97 | |
Mitsubishielectric Mc Works64 | <=4.04e | |
ICONICS, Mitsubishi Electric GENESIS64 (all versions up to and including 10.97) | ||
ICONICS, Mitsubishi Electric MC Works64 (all version of MC Works64, up to and including Version 4.04E) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-27041.
The severity of CVE-2021-27041 is high, with a severity value of 7.8.
The following Autodesk software products are affected by CVE-2021-27041: Autodesk Advance Steel, Autodesk Autocad, Autodesk AutoCAD Architecture, Autodesk AutoCAD Electrical, Autodesk Autocad Lt, Autodesk AutoCAD Map 3D, Autodesk AutoCAD Mechanical, Autodesk AutoCAD MEP, Autodesk AutoCAD Plant 3D, and Autodesk Civil 3D.
CVE-2021-27041 can be exploited by using a maliciously crafted DWG file to write beyond the allocated buffer while parsing DWG files, which can lead to the execution of arbitrary code.
Yes, a fix is available for CVE-2021-27041. Please refer to the vendor's security advisory for more information.