CVE-2022-0545

7.8 HIGH

📋 TL;DR

CVE-2022-0545 is an integer overflow vulnerability in Blender's 2D image processing that allows attackers to achieve arbitrary code execution or information disclosure by loading a malicious image file. This affects users running vulnerable Blender versions prior to 2.83.19, 2.93.8, and 3.1. Successful exploitation gives attackers control over the Blender process with the same privileges as the user running the software.

💻 Affected Systems

Products:
  • Blender
Versions: All versions prior to 2.83.19, 2.93.8, and 3.1
Operating Systems: All platforms running vulnerable Blender versions
Default Config Vulnerable: ⚠️ Yes
Notes: Any system with vulnerable Blender versions installed is affected when processing image files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution with the privileges of the Blender user, potentially leading to complete system compromise if Blender runs with elevated privileges.

🟠

Likely Case

Local code execution when a user opens a malicious image file, potentially leading to malware installation or data theft.

🟢

If Mitigated

Limited impact if Blender runs with minimal privileges and in isolated environments, though information disclosure may still occur.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to load a malicious image file. No public proof-of-concept has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.83.19, 2.93.8, or 3.1 and later

Vendor Advisory: https://developer.blender.org/T94629

Restart Required: No

Instructions:

1. Download the latest patched version from blender.org. 2. Install the update following Blender's standard installation process. 3. Verify the version is 2.83.19, 2.93.8, or 3.1+.

🔧 Temporary Workarounds

Restrict image file sources

all

Only load image files from trusted sources and avoid opening untrusted image files in Blender.

Run Blender with reduced privileges

all

Execute Blender with minimal user privileges to limit potential damage from exploitation.

🧯 If You Can't Patch

  • Isolate Blender usage to dedicated systems with no sensitive data
  • Implement application whitelisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check Blender version via Help > About Blender menu or command line: blender --version

Check Version:

blender --version

Verify Fix Applied:

Confirm version is 2.83.19, 2.93.8, or 3.1+ using the same methods

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes when loading image files
  • Unusual process behavior from Blender

Network Indicators:

  • Downloads of suspicious image files by Blender users

SIEM Query:

Process:blender AND (EventID:1000 OR EventID:1001) OR FileName:*.blend AND Hash:malicious

🔗 References

📤 Share & Export