TL;DR

An out-of-bounds write vulnerability exists in the CATPART file parser of Autodesk AutoCAD, allowing for arbitrary code execution with user interaction.

What happened

["Autodesk AutoCAD's CATPART file parser contains an OOB write flaw", 'Exploitation requires user to open a malicious file or visit a compromised site']

Why it matters for ops

['Users may execute remote code without their knowledge', 'Vulnerability can be leveraged for lateral movement within networks']

Mitigation

  • Update to the latest version of Autodesk AutoCAD
  • Implement network segmentation and least privilege access controls

Action items

  • Apply available security updates immediately
  • Monitor for signs of exploitation via log reviews

Detection IOCs

  • Unexpected crashes while opening CATPART files
  • Network traffic patterns indicative of command and control communications

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-106/