CVE-2023-27914

7.8 HIGH

📋 TL;DR

A stack buffer overflow vulnerability in Autodesk AutoCAD 2023 allows attackers to execute arbitrary code or read sensitive data by tricking users into opening malicious X_B files. This affects AutoCAD 2023 users who open untrusted files. The vulnerability requires user interaction but can lead to full system compromise.

💻 Affected Systems

Products:
  • Autodesk AutoCAD 2023
Versions: 2023 versions prior to the security update
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All AutoCAD 2023 installations are vulnerable until patched. Requires user to open malicious X_B file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with current user privileges, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crash or limited data disclosure when users open malicious files from untrusted sources.

🟢

If Mitigated

No impact if users only open trusted files and proper security controls are in place.

🌐 Internet-Facing: MEDIUM - Requires user to download and open malicious file, but common in engineering workflows.
🏢 Internal Only: MEDIUM - Internal users could be tricked via phishing or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious file. No public exploits known at advisory time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AutoCAD 2023 with security update from May 2023

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0005

Restart Required: Yes

Instructions:

1. Open AutoCAD 2023. 2. Go to Help > About. 3. Check for updates. 4. Install available security updates. 5. Restart AutoCAD.

🔧 Temporary Workarounds

Block X_B file extensions

windows

Prevent AutoCAD from opening X_B files via group policy or application restrictions.

Not applicable - configure via Group Policy or application whitelisting

User awareness training

all

Train users to only open X_B files from trusted sources.

🧯 If You Can't Patch

  • Restrict user permissions to limit impact of potential code execution
  • Implement application whitelisting to prevent unauthorized executables

🔍 How to Verify

Check if Vulnerable:

Check AutoCAD version: Open AutoCAD, go to Help > About, verify version is 2023 without May 2023 security updates.

Check Version:

In AutoCAD: Help > About

Verify Fix Applied:

Verify AutoCAD version includes May 2023 security updates in About dialog.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes from AutoCAD.exe
  • Unusual process creation from AutoCAD

Network Indicators:

  • Downloads of X_B files from untrusted sources

SIEM Query:

Process:AutoCAD.exe AND (EventID:1000 OR ParentImage:*AutoCAD*)

🔗 References

📤 Share & Export