Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-41305: Memory Corruption in Subassembly Composer

0
High
VulnerabilityCVE-2022-41305cvecve-2022-41305
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Subassembly Composer

Description

A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.

AI-Powered Analysis

AILast updated: 07/06/2025, 16:12:25 UTC

Technical Analysis

CVE-2022-41305 is a high-severity memory corruption vulnerability identified in the Subassembly Composer application, affecting versions from 2020 through 2023. The vulnerability arises when the application processes a maliciously crafted PKT file, leading to a write access violation that causes memory corruption. This type of vulnerability is classified under CWE-787 (Out-of-bounds Write), which typically allows an attacker to overwrite memory locations beyond the intended buffer boundaries. While the vulnerability alone causes memory corruption, it can be chained with other vulnerabilities to achieve arbitrary code execution within the context of the current process. The CVSS v3.1 score of 7.8 reflects a high impact on confidentiality, integrity, and availability, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The vulnerability is exploitable without privileges but requires the user to open or process the malicious PKT file through SubassemblyComposer.exe. No known exploits are currently reported in the wild, and no patches or vendor advisories are linked, though the vulnerability is publicly disclosed and enriched by CISA. The Subassembly Composer application is specialized software, and the vulnerability's exploitation could lead to severe consequences including unauthorized code execution, data compromise, or denial of service within affected environments.

Potential Impact

For European organizations using Subassembly Composer, this vulnerability poses a significant risk. The potential for arbitrary code execution could allow attackers to compromise sensitive project data, intellectual property, or disrupt critical workflows. Since the attack requires local access and user interaction, the threat is more pronounced in environments where users handle untrusted PKT files or where social engineering could be used to trick users into opening malicious files. The high impact on confidentiality, integrity, and availability means that successful exploitation could lead to data breaches, operational downtime, and loss of trust. Organizations in sectors such as engineering, manufacturing, or construction that rely on Subassembly Composer for design or assembly processes could face operational disruptions and financial losses. Additionally, the lack of available patches increases the urgency for mitigation. Given the European Union's strict data protection regulations (e.g., GDPR), any data compromise resulting from exploitation could also lead to regulatory penalties and reputational damage.

Mitigation Recommendations

1. Restrict usage of Subassembly Composer to trusted users and environments only, minimizing exposure to untrusted PKT files. 2. Implement strict file handling policies, including scanning and validating PKT files before opening them in the application. 3. Employ application whitelisting and sandboxing techniques to limit the execution context of SubassemblyComposer.exe, reducing the impact of potential exploitation. 4. Educate users about the risks of opening files from untrusted sources and enforce policies to avoid social engineering attacks. 5. Monitor system and application logs for unusual behavior indicative of exploitation attempts. 6. Since no patches are currently available, consider isolating or limiting the use of affected versions and evaluate alternative tools or updated versions once patches are released. 7. Maintain up-to-date endpoint protection solutions that may detect anomalous memory corruption or exploitation behaviors. 8. Coordinate with vendors or security advisories for updates or patches and apply them promptly upon release.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
autodesk
Date Reserved
2022-09-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aecab6

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 4:12:25 PM

Last updated: 2/7/2026, 2:41:06 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats