CVE-2022-27866

7.8 HIGH

📋 TL;DR

CVE-2022-27866 is an out-of-bounds read vulnerability in Autodesk Design Review's TIFF file parser. Attackers can craft malicious TIFF files that cause the application to read beyond allocated memory boundaries, potentially leading to information disclosure or, when combined with other vulnerabilities, remote code execution. This affects users who open untrusted TIFF files with vulnerable versions of Autodesk Design Review.

💻 Affected Systems

Products:
  • Autodesk Design Review
Versions: All versions prior to 2023
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction to open a malicious TIFF file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution in the context of the current user, potentially leading to full system compromise if combined with privilege escalation vulnerabilities.

🟠

Likely Case

Application crash (denial of service) or information disclosure through memory leaks.

🟢

If Mitigated

Limited impact if proper file handling controls prevent opening untrusted TIFF files.

🌐 Internet-Facing: LOW - Design Review is typically not an internet-facing service.
🏢 Internal Only: MEDIUM - Users could be tricked into opening malicious TIFF files via email or network shares.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction and may need chaining with other vulnerabilities for code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023 version or later

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009

Restart Required: Yes

Instructions:

1. Download latest Autodesk Design Review 2023 or newer from Autodesk website. 2. Install the update. 3. Restart system if prompted.

🔧 Temporary Workarounds

Disable TIFF file association

windows

Prevent Design Review from automatically opening TIFF files

Control Panel > Default Programs > Associate a file type or protocol with a program > Change .tiff/.tif to open with another application

🧯 If You Can't Patch

  • Restrict user permissions to prevent execution of untrusted TIFF files
  • Implement application whitelisting to block Design Review execution

🔍 How to Verify

Check if Vulnerable:

Check Design Review version via Help > About. If version is earlier than 2023, it's vulnerable.

Check Version:

Not applicable - check via GUI Help > About menu

Verify Fix Applied:

Verify version is 2023 or later in Help > About dialog.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of DesignReview.exe
  • Unusual file access patterns to TIFF files

Network Indicators:

  • Unusual downloads of TIFF files to endpoints with Design Review

SIEM Query:

Process:DesignReview.exe AND (EventID:1000 OR FileExtension:.tiff OR FileExtension:.tif)

🔗 References

📤 Share & Export