CVE-2021-40158
📋 TL;DR
This vulnerability allows a malicious JT file to cause Autodesk Inventor and AutoCAD to read beyond allocated memory boundaries. When combined with other vulnerabilities, this could lead to arbitrary code execution in the context of the current process. Users of affected Autodesk products are at risk.
💻 Affected Systems
- Autodesk Inventor
- Autodesk AutoCAD
📦 What is this software?
Advance Steel by Autodesk
Autocad by Autodesk
Autocad Lt by Autodesk
Autocad Mep by Autodesk
Civil 3d by Autodesk
Inventor by Autodesk
Inventor by Autodesk
Inventor by Autodesk
Inventor by Autodesk
⚠️ Risk & Real-World Impact
Worst Case
Arbitrary code execution leading to full system compromise, data theft, or ransomware deployment when combined with other vulnerabilities.
Likely Case
Application crash (denial of service) or limited information disclosure from memory reads.
If Mitigated
Application crash with no data loss if proper sandboxing and memory protections are in place.
🎯 Exploit Status
Requires user interaction to open malicious file. Needs to be combined with other vulnerabilities for code execution.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Updates available through Autodesk Desktop App or Autodesk Account
Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0002
Restart Required: Yes
Instructions:
1. Open Autodesk Desktop App or log into Autodesk Account. 2. Check for available updates. 3. Install all security updates for affected products. 4. Restart computer after installation.
🔧 Temporary Workarounds
Block JT file extensions
windowsPrevent opening of JT files via group policy or application whitelisting
Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: Path: *.jt, Security Level: Disallowed
User awareness training
allTrain users not to open JT files from untrusted sources
🧯 If You Can't Patch
- Implement application whitelisting to prevent execution of unauthorized files
- Use email filtering to block JT attachments and implement web filtering for malicious downloads
🔍 How to Verify
Check if Vulnerable:
Check installed version of Autodesk Inventor or AutoCAD against affected versions list
Check Version:
For Inventor: Help > About Inventor; For AutoCAD: Help > About AutoCAD
Verify Fix Applied:
Verify version is updated beyond vulnerable versions and check Autodesk Desktop App for no pending updates
📡 Detection & Monitoring
Log Indicators:
- Application crash logs from Autodesk products
- Windows Event Logs: Application Error events for Inventor/AutoCAD
Network Indicators:
- Unusual outbound connections after opening JT files
- JT file downloads from untrusted sources
SIEM Query:
EventID=1000 AND SourceName="Application Error" AND (ProcessName="Inventor.exe" OR ProcessName="acad.exe")
🔗 References
- https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0002
- https://www.zerodayinitiative.com/advisories/ZDI-22-281/
- https://www.zerodayinitiative.com/advisories/ZDI-22-283/
- https://www.zerodayinitiative.com/advisories/ZDI-22-284/
- https://www.zerodayinitiative.com/advisories/ZDI-22-285/
- https://www.zerodayinitiative.com/advisories/ZDI-22-286/
- https://www.zerodayinitiative.com/advisories/ZDI-22-287/
- https://www.zerodayinitiative.com/advisories/ZDI-22-288/
- https://www.zerodayinitiative.com/advisories/ZDI-22-441/
- https://www.zerodayinitiative.com/advisories/ZDI-22-443/
- https://www.zerodayinitiative.com/advisories/ZDI-22-444/
- https://www.zerodayinitiative.com/advisories/ZDI-22-445/
- https://www.zerodayinitiative.com/advisories/ZDI-22-447/
- https://www.zerodayinitiative.com/advisories/ZDI-22-448/
- https://www.zerodayinitiative.com/advisories/ZDI-22-449/
- https://www.zerodayinitiative.com/advisories/ZDI-22-450/
- https://www.zerodayinitiative.com/advisories/ZDI-22-451/
- https://www.zerodayinitiative.com/advisories/ZDI-22-452/
- https://www.zerodayinitiative.com/advisories/ZDI-22-453/
- https://www.zerodayinitiative.com/advisories/ZDI-22-454/
- https://www.zerodayinitiative.com/advisories/ZDI-22-455/
- https://www.zerodayinitiative.com/advisories/ZDI-22-466/
- https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0002
- https://www.zerodayinitiative.com/advisories/ZDI-22-281/
- https://www.zerodayinitiative.com/advisories/ZDI-22-283/
- https://www.zerodayinitiative.com/advisories/ZDI-22-284/
- https://www.zerodayinitiative.com/advisories/ZDI-22-285/
- https://www.zerodayinitiative.com/advisories/ZDI-22-286/
- https://www.zerodayinitiative.com/advisories/ZDI-22-287/
- https://www.zerodayinitiative.com/advisories/ZDI-22-288/
- https://www.zerodayinitiative.com/advisories/ZDI-22-441/
- https://www.zerodayinitiative.com/advisories/ZDI-22-443/
- https://www.zerodayinitiative.com/advisories/ZDI-22-444/
- https://www.zerodayinitiative.com/advisories/ZDI-22-445/
- https://www.zerodayinitiative.com/advisories/ZDI-22-447/
- https://www.zerodayinitiative.com/advisories/ZDI-22-448/
- https://www.zerodayinitiative.com/advisories/ZDI-22-449/
- https://www.zerodayinitiative.com/advisories/ZDI-22-450/
- https://www.zerodayinitiative.com/advisories/ZDI-22-451/
- https://www.zerodayinitiative.com/advisories/ZDI-22-452/
- https://www.zerodayinitiative.com/advisories/ZDI-22-453/
- https://www.zerodayinitiative.com/advisories/ZDI-22-454/
- https://www.zerodayinitiative.com/advisories/ZDI-22-455/
- https://www.zerodayinitiative.com/advisories/ZDI-22-466/