CVE-2022-25788

7.8 HIGH

📋 TL;DR

This vulnerability in Autodesk AutoCAD 2022 allows an attacker to execute arbitrary code by tricking a user into opening a maliciously crafted JT file, which triggers a buffer overflow. It affects users of AutoCAD 2022 who process JT files, potentially leading to full system compromise.

💻 Affected Systems

Products:
  • Autodesk AutoCAD
Versions: 2022 version prior to the patched update
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default installations when processing JT files; no special configuration is required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with arbitrary code execution, enabling data theft, ransomware deployment, or lateral movement within a network.

🟠

Likely Case

Local privilege escalation or malware installation on the affected AutoCAD system, often through social engineering to open a malicious file.

🟢

If Mitigated

Limited impact with no code execution if file parsing is blocked or the system is isolated, though crashes may still occur.

🌐 Internet-Facing: LOW, as exploitation typically requires user interaction to open a file, not direct internet exposure of the software.
🏢 Internal Only: MEDIUM, due to the risk from internal threats or compromised files shared within an organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious JT file; no public proof-of-concept has been disclosed as of the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to the latest version of AutoCAD 2022 as specified in the vendor advisory

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0002

Restart Required: Yes

Instructions:

1. Open AutoCAD 2022. 2. Go to the 'Help' menu and select 'Check for Updates'. 3. Follow the prompts to download and install the latest update. 4. Restart AutoCAD to apply the patch.

🔧 Temporary Workarounds

Block JT file processing

all

Prevent AutoCAD from opening JT files by disabling or removing the JT file association.

Not applicable; configure via Windows File Explorer or macOS Finder to change default programs for .jt files.

🧯 If You Can't Patch

  • Restrict user permissions to limit the impact of potential code execution.
  • Implement network segmentation to isolate AutoCAD systems and monitor for suspicious file activity.

🔍 How to Verify

Check if Vulnerable:

Check the AutoCAD version; if it is AutoCAD 2022 and not updated to the latest patch, it is vulnerable.

Check Version:

In AutoCAD, go to 'Help' > 'About AutoCAD' to view the version number.

Verify Fix Applied:

Verify the version after patching matches the latest release from Autodesk's advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual crashes or errors in AutoCAD logs when opening JT files
  • Unexpected process executions from AutoCAD

Network Indicators:

  • Outbound connections from AutoCAD to unknown IPs post-file opening

SIEM Query:

Example: 'source="AutoCAD" AND (event="crash" OR event="file_open" AND file_extension="jt")'

🔗 References

📤 Share & Export