CVE-2022-27526

7.8 HIGH

📋 TL;DR

This vulnerability allows an attacker to execute arbitrary code by tricking a user into opening a malicious TGA image file in Autodesk Design Review. It affects users of Autodesk Design Review who open untrusted TGA files, potentially leading to full system compromise.

💻 Affected Systems

Products:
  • Autodesk Design Review
Versions: All versions prior to 2023
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction to open a malicious TGA file. Design Review must be installed and associated with TGA files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the same privileges as the Design Review user, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Memory corruption causing application crashes or denial of service, with potential for code execution if combined with other vulnerabilities.

🟢

If Mitigated

Limited to application crash if proper file validation and memory protections are in place, with no code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious file. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023 version or later

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004

Restart Required: Yes

Instructions:

1. Download and install Autodesk Design Review 2023 or later from Autodesk's official website. 2. Uninstall previous vulnerable versions. 3. Restart the system after installation.

🔧 Temporary Workarounds

Disable TGA file association

windows

Prevent Design Review from automatically opening TGA files by changing the default file association.

Control Panel > Default Programs > Associate a file type or protocol with a program > Change .tga association to another application

Block TGA files at perimeter

all

Configure email and web gateways to block TGA file attachments and downloads.

🧯 If You Can't Patch

  • Restrict user permissions to limit potential damage from code execution
  • Implement application whitelisting to prevent unauthorized executables from running

🔍 How to Verify

Check if Vulnerable:

Check the version of Autodesk Design Review installed. Versions prior to 2023 are vulnerable.

Check Version:

Open Design Review > Help > About Design Review

Verify Fix Applied:

Verify that Autodesk Design Review version is 2023 or later and that no older versions are present.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of DesignReview.exe
  • Unusual process creation from DesignReview.exe

Network Indicators:

  • Downloads of TGA files from untrusted sources
  • Outbound connections from DesignReview.exe to suspicious IPs

SIEM Query:

process_name:DesignReview.exe AND (event_id:1000 OR event_id:1001) OR process_parent_name:DesignReview.exe

🔗 References

📤 Share & Export