First published: Fri Jun 25 2021(Updated: )
A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. This vulnerability can be exploited to execute arbitrary code
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
ICONICS, Mitsubishi Electric ICONICS Suite including GENESIS64, Hyper Historian, AnalytiX, and MobileHMI | ||
Mitsubishi Electric MC Works64 | ||
Autodesk AutoCAD Advance Steel | >=2019<2019.1.3 | |
Autodesk AutoCAD Advance Steel | >=2020<2020.1.4 | |
Autodesk AutoCAD Advance Steel | >=2021<2021.1.1 | |
Autodesk AutoCAD Advance Steel | >=2022<2022.0.1 | |
AutoCAD | >=2019<2019.1.3 | |
AutoCAD | >=2020<2020.1.4 | |
AutoCAD | >=2021<2021.1.1 | |
AutoCAD | >=2022<2022.0.1 | |
AutoCAD | >=2019<2019.1.3 | |
AutoCAD | >=2020<2020.1.4 | |
AutoCAD | >=2021<2021.1.1 | |
AutoCAD | >=2022<=2022.0.1 | |
AutoCAD | >=2019<2019.1.3 | |
AutoCAD | >=2020<2020.1.4 | |
AutoCAD | >=2021<2021.1.1 | |
AutoCAD | >=2022<2022.0.1 | |
AutoCAD LT | >=2019<2019.1.3 | |
AutoCAD LT | >=2020<2020.1.4 | |
AutoCAD LT | >=2021<2021.1.1 | |
AutoCAD LT | >=2022<2022.0.1 | |
AutoCAD | >=2019<2019.1.3 | |
AutoCAD | >=2020<2020.1.4 | |
AutoCAD | >=2021<2021.1.1 | |
AutoCAD | >=2022<2022.0.1 | |
AutoCAD | >=2019<2019.1.3 | |
AutoCAD | >=2020<2020.1.4 | |
AutoCAD | >=2021<2021.1.1 | |
AutoCAD | >=2022<2022.0.1 | |
AutoCAD | >=2019<2019.1.3 | |
AutoCAD | >=2020<2020.1.4 | |
AutoCAD | >=2021<2021.1.1 | |
AutoCAD | >=2022<2022.0.1 | |
AutoCAD | >=2019<2019.1.3 | |
AutoCAD | >=2020<2020.1.4 | |
AutoCAD | >=2021<2021.1.1 | |
AutoCAD | >=2022<2022.0.1 | |
Autodesk AutoCAD Civil 3D | >=2019<2019.1.3 | |
Autodesk AutoCAD Civil 3D | >=2020<2020.1.4 | |
Autodesk AutoCAD Civil 3D | >=2021<2021.1.1 | |
Autodesk AutoCAD Civil 3D | >=2022<2022.0.1 | |
Autodesk Design Review 2011 | =2018 | |
Autodesk Design Review 2011 | =2018-hotfix | |
Autodesk Design Review 2011 | =2018-hotfix2 | |
Autodesk Design Review 2011 | =2018-hotfix3 | |
Autodesk Design Review 2011 | =2018-hotfix4 | |
ICONICS GENESIS64 | <=10.97 | |
Mitsubishi Electric MC Works64 | <=4.04e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-27041.
The severity of CVE-2021-27041 is high, with a severity value of 7.8.
The following Autodesk software products are affected by CVE-2021-27041: Autodesk Advance Steel, Autodesk Autocad, Autodesk AutoCAD Architecture, Autodesk AutoCAD Electrical, Autodesk Autocad Lt, Autodesk AutoCAD Map 3D, Autodesk AutoCAD Mechanical, Autodesk AutoCAD MEP, Autodesk AutoCAD Plant 3D, and Autodesk Civil 3D.
CVE-2021-27041 can be exploited by using a maliciously crafted DWG file to write beyond the allocated buffer while parsing DWG files, which can lead to the execution of arbitrary code.
Yes, a fix is available for CVE-2021-27041. Please refer to the vendor's security advisory for more information.