CVE-2021-27036

7.8 HIGH

📋 TL;DR

This is a buffer overflow vulnerability in Autodesk software that allows arbitrary code execution when processing malicious image files. Attackers can exploit it by tricking users into opening specially crafted PCX, PICT, RCL, TIF, BMP, PSD, or TIFF files. Users of affected Autodesk products are at risk.

💻 Affected Systems

Products:
  • Autodesk AutoCAD
  • Autodesk Design Review
  • Autodesk Navisworks
  • Autodesk Advance Steel
  • Autodesk Civil 3D
Versions: Multiple versions prior to 2022.1.2, 2021.1.5, and 2020.1.6
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Windows and macOS versions. Vulnerability exists in the core file parsing components shared across multiple Autodesk products.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or remote code execution on the user's workstation, allowing attackers to install malware, steal credentials, or access sensitive files.

🟢

If Mitigated

Limited impact if file processing occurs in sandboxed environments or with restricted user privileges, potentially causing only application crashes.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious file. No publicly available proof-of-concept has been identified, but the vulnerability is well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2022.1.2, 2021.1.5, or 2020.1.6 depending on product version

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004

Restart Required: Yes

Instructions:

1. Open the Autodesk Desktop App or access Autodesk Account. 2. Check for available updates for your specific product. 3. Download and install the security update for your version (2022.1.2, 2021.1.5, or 2020.1.6). 4. Restart the application and computer if prompted.

🔧 Temporary Workarounds

Restrict file type processing

all

Configure applications to not automatically process or preview the vulnerable file types

User awareness training

all

Train users to avoid opening image files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Run affected software with least privilege accounts and in isolated environments

🔍 How to Verify

Check if Vulnerable:

Check your Autodesk product version against the vulnerable versions listed in the advisory. Open the application and check Help > About or similar menu.

Check Version:

For AutoCAD: Open AutoCAD and type 'ABOUT' in command line or check Help > About

Verify Fix Applied:

Verify the installed version is 2022.1.2, 2021.1.5, or 2020.1.6 or later, depending on your product line.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing image files
  • Unexpected process creation from Autodesk applications
  • File parsing errors in application logs

Network Indicators:

  • Unusual outbound connections from Autodesk applications
  • File downloads followed by application crashes

SIEM Query:

Process Creation where (Image contains 'acad.exe' OR Image contains 'DesignReview.exe') AND CommandLine contains '.pcx' OR CommandLine contains '.tif' OR CommandLine contains '.bmp'

🔗 References

📤 Share & Export