CVE-2021-44045

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted DGN files in Open Design Alliance Drawings SDK. Attackers can exploit an out-of-bounds write vulnerability to execute arbitrary code in the context of the current process. Organizations using affected versions of the SDK for CAD file processing are at risk.

💻 Affected Systems

Products:
  • Open Design Alliance Drawings SDK
Versions: All versions before 2022.11
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using the affected SDK versions to parse DGN files is vulnerable. This includes CAD software, document management systems, and file conversion tools.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the application processing the DGN file, potentially leading to lateral movement and data exfiltration.

🟠

Likely Case

Application crash leading to denial of service, with potential for remote code execution if the attacker can deliver a malicious DGN file to a vulnerable system.

🟢

If Mitigated

No impact if the vulnerability is patched or if DGN file processing is disabled/isolated.

🌐 Internet-Facing: MEDIUM - Risk exists if applications using the SDK process DGN files from untrusted sources via web interfaces or email attachments.
🏢 Internal Only: MEDIUM - Internal users could exploit this if they can submit DGN files to vulnerable applications, though attack surface is more limited.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires delivering a malicious DGN file to a vulnerable system. No authentication is needed if the application processes files from untrusted sources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2022.11 and later

Vendor Advisory: https://www.opendesign.com/security-advisories

Restart Required: Yes

Instructions:

1. Download Open Design Alliance Drawings SDK version 2022.11 or later. 2. Replace the vulnerable SDK components in your application. 3. Recompile and redeploy your application. 4. Restart any services using the SDK.

🔧 Temporary Workarounds

Disable DGN file processing

all

Temporarily disable or block DGN file processing in applications using the vulnerable SDK

File type filtering

all

Implement file type validation to reject DGN files at network boundaries and application entry points

🧯 If You Can't Patch

  • Isolate applications using the SDK in network segments with restricted access
  • Implement application sandboxing or containerization to limit potential damage from exploitation

🔍 How to Verify

Check if Vulnerable:

Check the SDK version used by your application. If it's older than 2022.11, you are vulnerable.

Check Version:

Check your application's documentation or configuration files for SDK version information. For compiled applications, you may need to contact the vendor.

Verify Fix Applied:

Verify that your application uses Open Design Alliance Drawings SDK version 2022.11 or later.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing DGN files
  • Unusual process creation from CAD applications
  • Memory access violation errors in application logs

Network Indicators:

  • Unexpected DGN file transfers to vulnerable systems
  • Network traffic patterns indicating file uploads to CAD processing services

SIEM Query:

source="application_logs" AND ("DGN" OR "Open Design Alliance") AND ("crash" OR "access violation" OR "buffer overflow")

🔗 References

📤 Share & Export