CVE-2022-27873
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An attacker can force the victim’s device to perform arbitrary HTTP requests in WAN through a malicious SVG file being parsed by Autodesk Fusion 360’s document parser. The vulnerability exists in the application’s ‘Insert SVG’ procedure. An attacker can also leverage this vulnerability to obtain victim’s public IP and possibly other sensitive information.
Un atacante puede forzar el dispositivo de la víctima a llevar a cabo peticiones HTTP arbitrarias en la WAN mediante un archivo SVG malicioso analizado por el analizador de documentos de Autodesk Fusion 360. La vulnerabilidad se presenta en el procedimiento "Insert SVG" de la aplicación. Un atacante también puede aprovechar esta vulnerabilidad para obtener la IP pública de la víctima y posiblemente otra información confidencial
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-03-25 CVE Reserved
- 2022-07-29 CVE Published
- 2024-02-19 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-611: Improper Restriction of XML External Entity Reference
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0013 | 2022-08-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Autodesk Search vendor "Autodesk" | Fusion 360 Search vendor "Autodesk" for product "Fusion 360" | <= 2.0.12887 Search vendor "Autodesk" for product "Fusion 360" and version " <= 2.0.12887" | - |
Affected
|