Autodesk closes malicious code loopholes in AutoCAD applications

Published by: MRT

Published on:

Autodesk closes malicious code loopholes in AutoCAD applications

Attackers could attack systems with installed AutoCAD software and, in the worst case, execute malicious code. Overall, the threat level emanating from four security vulnerabilities is considered to be “high”.

A warning message from the developer does not appearwhich operating systems are affected by the vulnerabilities. The following applications for technical drawings and 3D models are specifically vulnerable. The versions are protected in each case 2022.0.1, 2021.1.1, 2020.1.4 and 2019.1.3. If you are using versions that are no longer in support, you should switch now at the latest.

  • Autodesk Advance Steel
  • Autodesk Civil 3D
  • AutoCAD
  • AutoCAD Architecture
  • AutoCAD Electrical
  • AutoCAD Map 3D
  • AutoCAD Mechanical
  • AutoCAD MEP
  • AutoCAD Plant 3D
  • AutoCAD LT

For attacks to be successful, attackers have to slip prepared DWG files to the victims. Memory errors may occur when opening. This is a common way of pushing malicious code onto computers and executing them.


(of)

Disclaimer: This article is generated from the feed and not edited by our team.