First published: Fri Apr 14 2023(Updated: )
A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 can be used to cause an Integer Overflow. A malicious actor can leverage this vulnerability to cause a crash or read sensitive data, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk Autocad | >=2023<2023.1.3 | |
Autodesk Autocad Advance Steel | >=2023<2023.1.3 | |
Autodesk AutoCAD Architecture | >=2023<2023.1.3 | |
Autodesk Autocad Civil 3d | >=2023<2023.1.3 | |
Autodesk AutoCAD Electrical | >=2023<2023.1.3 | |
Autodesk Autocad Lt | >=2023<2023.1.3 | |
Autodesk AutoCAD Map 3D | >=2023<2023.1.3 | |
Autodesk AutoCAD Mechanical | >=2023<2023.1.3 | |
Autodesk AutoCAD MEP | >=2023<2023.1.3 | |
Autodesk AutoCAD Plant 3D | >=2023<2023.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-27913.
CVE-2023-27913 has a severity rating of 7.8 (high).
Autodesk AutoCAD 2023 versions up to 2023.1.3 are affected, along with related products such as Autodesk AutoCAD Advance Steel, Autodesk AutoCAD Architecture, Autodesk AutoCAD Civil 3D, Autodesk AutoCAD Electrical, Autodesk AutoCAD LT, Autodesk AutoCAD Map 3D, Autodesk AutoCAD Mechanical, Autodesk AutoCAD MEP, and Autodesk AutoCAD Plant 3D.
CVE-2023-27913 can be exploited by parsing a maliciously crafted X_B file through Autodesk AutoCAD 2023, which can cause an Integer Overflow.
Yes, Autodesk has released a fix for CVE-2023-27913. Please refer to their security advisory for more information.