First published: Fri Jul 29 2022(Updated: )
Parsing a maliciously crafted PRT file can force Autodesk AutoCAD 2023 to read beyond allocated boundaries. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk Autocad | =2023 | |
Autodesk Autocad Advance Steel | =2023 | |
Autodesk AutoCAD Architecture | =2023 | |
Autodesk Autocad Civil 3d | =2023 | |
Autodesk AutoCAD Electrical | =2023 | |
Autodesk Autocad Lt | =2023 | |
Autodesk AutoCAD Map 3D | =2023 | |
Autodesk AutoCAD Mechanical | =2023 | |
Autodesk AutoCAD MEP | =2023 | |
Autodesk AutoCAD Plant 3D | =2023 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-33881 is a vulnerability in Autodesk AutoCAD 2023 that allows the parsing of a maliciously crafted PRT file to read beyond allocated boundaries, potentially leading to code execution.
CVE-2022-33881 has a severity rating of 7.8 out of 10 (high).
Autodesk AutoCAD 2023 and related versions, including Autodesk AutoCAD Advance Steel, Autodesk AutoCAD Architecture, Autodesk AutoCAD Civil 3D, Autodesk AutoCAD Electrical, Autodesk AutoCAD LT, Autodesk AutoCAD Map 3D, Autodesk AutoCAD Mechanical, Autodesk AutoCAD MEP, and Autodesk AutoCAD Plant 3D.
CVE-2022-33881 can be exploited by parsing a specially crafted PRT file.
For information on the fix or mitigation for CVE-2022-33881, please refer to the advisory provided by Autodesk: [Autodesk Security Advisory ADK-SA-2022-0014](https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0014)