CVE-2022-33881

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to craft malicious PRT files that cause Autodesk AutoCAD 2023 to read beyond allocated memory boundaries. When combined with other vulnerabilities, this could lead to arbitrary code execution within the AutoCAD process. Users running affected versions of AutoCAD are at risk.

💻 Affected Systems

Products:
  • Autodesk AutoCAD
Versions: 2023 versions prior to the July 2022 update
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects AutoCAD 2023; earlier versions are not vulnerable. Requires user interaction to open malicious PRT files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment when combined with other vulnerabilities.

🟠

Likely Case

Application crashes (denial of service) or limited information disclosure from memory reads.

🟢

If Mitigated

No impact if proper file handling controls and network segmentation are implemented.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but could be delivered via email or web downloads.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious files from compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious file. Exploitation for code execution requires chaining with additional vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2022 update or later

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0014

Restart Required: Yes

Instructions:

1. Open AutoCAD 2023. 2. Navigate to Help > Check for Updates. 3. Install the July 2022 security update. 4. Restart AutoCAD when prompted.

🔧 Temporary Workarounds

Disable PRT file association

windows

Remove AutoCAD as the default handler for PRT files to prevent automatic opening

Control Panel > Default Programs > Associate a file type or protocol with a program > Select .prt > Change program > Choose another application

User awareness training

all

Train users not to open PRT files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized AutoCAD execution
  • Use network segmentation to isolate AutoCAD workstations from critical systems

🔍 How to Verify

Check if Vulnerable:

Check AutoCAD version: Open AutoCAD, go to Help > About, verify version is earlier than July 2022 update

Check Version:

In AutoCAD command line: (getvar "acadver")

Verify Fix Applied:

Verify AutoCAD version shows July 2022 update or later in Help > About

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected PRT file processing

Network Indicators:

  • Downloads of PRT files from untrusted sources
  • Unusual outbound connections from AutoCAD process

SIEM Query:

source="autocad.log" AND (event="crash" OR event="memory_access_violation")

🔗 References

📤 Share & Export