CVE-2021-27046

7.8 HIGH

📋 TL;DR

This CVE describes a memory corruption vulnerability in Autodesk Navisworks PDF file processing that could allow remote code execution. Attackers can exploit this by tricking users into opening malicious PDF files containing crafted DLL payloads. Users of affected Navisworks versions are at risk.

💻 Affected Systems

Products:
  • Autodesk Navisworks
Versions: 2019, 2020, 2021, 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open malicious PDF files. DLL hijacking vulnerability in PDF processing component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Navisworks user, potentially leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Local privilege escalation or arbitrary code execution within the context of the Navisworks application, potentially leading to data exfiltration or further system compromise.

🟢

If Mitigated

Limited impact with proper application sandboxing, user privilege restrictions, and network segmentation preventing lateral movement.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious PDF) and knowledge of DLL hijacking techniques. No public exploits confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version per vendor advisory

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0008

Restart Required: Yes

Instructions:

1. Open Autodesk Navisworks. 2. Navigate to Help > About. 3. Check current version. 4. Download and install latest update from Autodesk website. 5. Restart computer after installation.

🔧 Temporary Workarounds

Restrict PDF file handling

windows

Configure Navisworks to not automatically process PDF files or use alternative PDF viewers

User awareness training

all

Train users to only open PDF files from trusted sources and verify file integrity

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized DLL execution
  • Run Navisworks with minimal user privileges and in isolated environments

🔍 How to Verify

Check if Vulnerable:

Check Navisworks version in Help > About menu. If version is 2019-2022 without latest security updates, system is vulnerable.

Check Version:

Not applicable - check via GUI Help > About menu

Verify Fix Applied:

Verify Navisworks version is updated beyond vulnerable versions listed in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Navisworks.exe
  • Failed DLL loading attempts
  • Unexpected network connections from Navisworks process

Network Indicators:

  • Outbound connections from Navisworks to unknown IPs
  • DNS queries for suspicious domains from Navisworks host

SIEM Query:

Process Creation: ParentImage contains 'navisworks.exe' AND (CommandLine contains '.dll' OR Image contains suspicious paths)

🔗 References

📤 Share & Export