First published: Wed Apr 13 2022(Updated: )
A buffer over-read can be exploited in Autodesk TrueView 2022 may lead to an exposure of sensitive information or a crash through using a maliciously crafted DWG file as an Input. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk Dwg Trueview | >=2019<2019.1.4 | |
Autodesk Dwg Trueview | >=2020<2020.1.5 | |
Autodesk Dwg Trueview | >=2021<2021.1.2 | |
Autodesk Dwg Trueview | >=2022<2022.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27523 is a vulnerability in Autodesk TrueView 2022 that can be exploited to expose sensitive information or cause a crash through a maliciously crafted DWG file.
CVE-2022-27523 has a severity score of 7.1, which is considered high.
CVE-2022-27523 can be exploited by using a maliciously crafted DWG file as an input in Autodesk TrueView 2022.
Versions 2019 to 2022 of Autodesk TrueView are affected by CVE-2022-27523.
To fix CVE-2022-27523, it is recommended to update Autodesk TrueView to the latest version available.