CVE-2022-27864

8.8 HIGH

📋 TL;DR

CVE-2022-27864 is a double free vulnerability in Autodesk Design Review that allows remote attackers to execute arbitrary code when users open malicious PDF files. This affects users of Autodesk Design Review software. Successful exploitation requires user interaction through opening a malicious file.

💻 Affected Systems

Products:
  • Autodesk Design Review
Versions: 2018, 2019, 2020, 2021, 2022, 2023
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default when processing PDF files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malicious code execution with user privileges, potentially leading to data exfiltration, credential theft, or installation of additional malware.

🟢

If Mitigated

Limited impact due to proper patching, application whitelisting, and user awareness preventing malicious file execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious PDF files. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version as specified in Autodesk advisory

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009

Restart Required: Yes

Instructions:

1. Open Autodesk Design Review
2. Navigate to Help > Check for Updates
3. Follow prompts to install available updates
4. Restart the application after installation

🔧 Temporary Workarounds

Disable PDF file association

windows

Remove Design Review as default handler for PDF files to prevent automatic opening

Control Panel > Default Programs > Set Default Programs > Select another program for PDF files

Application control policy

windows

Block execution of DesignReview.exe via application whitelisting

🧯 If You Can't Patch

  • Uninstall Autodesk Design Review if not required
  • Implement network segmentation to isolate systems running vulnerable software

🔍 How to Verify

Check if Vulnerable:

Check installed version of Autodesk Design Review against affected versions (2018-2023)

Check Version:

Open Design Review > Help > About Design Review

Verify Fix Applied:

Verify version is updated beyond affected range and check for security updates in application

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for DesignReview.exe with suspicious parent processes
  • Application crash logs from Design Review

Network Indicators:

  • Outbound connections from DesignReview.exe to unknown external IPs
  • Unusual network traffic following PDF file opening

SIEM Query:

process_name:DesignReview.exe AND (parent_process:cmd.exe OR parent_process:powershell.exe OR parent_process:wscript.exe)

🔗 References

📤 Share & Export