CVE-2022-27523

7.1 HIGH

📋 TL;DR

A buffer over-read vulnerability in Autodesk TrueView 2022 allows attackers to expose sensitive information or cause application crashes by tricking users into opening malicious DWG files. Combined with other vulnerabilities, this could potentially lead to code execution. Users of Autodesk TrueView 2022 are affected.

💻 Affected Systems

Products:
  • Autodesk TrueView 2022
Versions: 2022 versions prior to the security update
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects TrueView 2022, not other Autodesk products or earlier TrueView versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure leading to exposure of sensitive data, application crashes disrupting workflows, and potential code execution when combined with other vulnerabilities.

🟠

Likely Case

Application crashes and information disclosure from memory contents when users open malicious DWG files.

🟢

If Mitigated

Limited impact with proper file handling controls and user awareness preventing malicious file execution.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but DWG files are commonly shared externally.
🏢 Internal Only: MEDIUM - Internal users could be targeted via email attachments or network shares containing malicious DWG files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious DWG files. No public exploit code has been reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated version via Autodesk security update

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007

Restart Required: Yes

Instructions:

1. Open Autodesk TrueView 2022. 2. Navigate to Help > Check for Updates. 3. Install available security updates. 4. Restart the application.

🔧 Temporary Workarounds

Restrict DWG file handling

all

Configure system to open DWG files only in trusted applications or sandboxed environments

User awareness training

all

Train users to only open DWG files from trusted sources

🧯 If You Can't Patch

  • Restrict user permissions to limit potential damage from code execution
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check Autodesk TrueView version in Help > About. If version is 2022 without security updates, it's vulnerable.

Check Version:

In TrueView: Help > About or check program properties in Windows

Verify Fix Applied:

Verify version has been updated and check that security updates are installed via the update manager.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from TrueView
  • Unexpected memory access errors in system logs

Network Indicators:

  • Unusual file downloads of DWG files from untrusted sources

SIEM Query:

source="*TrueView*" AND (event="Crash" OR event="Access Violation")

🔗 References

📤 Share & Export