First published: Tue Apr 19 2022(Updated: )
A maliciously crafted JT file in Autodesk AutoCAD 2022 may be used to write beyond the allocated buffer while parsing JT files. This vulnerability can be exploited to execute arbitrary code.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk Advance Steel | >=2022<2022.1.2 | |
Autodesk Autocad | >=2022<2022.1.2 | |
Autodesk Autocad | >=2022<2022.2.2 | |
Autodesk AutoCAD Architecture | >=2022<2022.1.2 | |
Autodesk AutoCAD Electrical | >=2022<2022.1.2 | |
Autodesk Autocad Lt | >=2022<2022.1.2 | |
Autodesk Autocad Lt | >=2022<2022.2.2 | |
Autodesk AutoCAD Map 3D | >=2022<2022.1.2 | |
Autodesk AutoCAD Mechanical | >=2022<2022.1.2 | |
Autodesk AutoCAD MEP | >=2022<2022.1.2 | |
Autodesk AutoCAD Plant 3D | >=2022<2022.1.2 | |
Autodesk Civil 3D | >=2022<2022.1.2 | |
Autodesk Inventor | >=2022<2022.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Autodesk AutoCAD vulnerability is CVE-2022-25788.
CVE-2022-25788 has a severity rating of 7.8 (high).
Autodesk Advance Steel, Autodesk Autocad, Autodesk Autocad Architecture, Autodesk Autocad Electrical, Autodesk Autocad Lt, Autodesk Autocad Map 3D, Autodesk Autocad Mechanical, Autodesk Autocad MEP, Autodesk Autocad Plant 3D, Autodesk Civil 3D, and Autodesk Inventor are affected by CVE-2022-25788.
CVE-2022-25788 can be exploited by using a maliciously crafted JT file in Autodesk AutoCAD 2022 to write beyond the allocated buffer while parsing JT files, thereby allowing the execution of arbitrary code.
More information about CVE-2022-25788 can be found at https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0002.