Skip to main content

CVE-2022-41305: Memory Corruption in Subassembly Composer

High
VulnerabilityCVE-2022-41305cvecve-2022-41305
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Subassembly Composer

Description

A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.

AI-Powered Analysis

AILast updated: 07/06/2025, 16:12:25 UTC

Technical Analysis

CVE-2022-41305 is a high-severity memory corruption vulnerability identified in the Subassembly Composer application, affecting versions from 2020 through 2023. The vulnerability arises when the application processes a maliciously crafted PKT file, leading to a write access violation that causes memory corruption. This type of vulnerability is classified under CWE-787 (Out-of-bounds Write), which typically allows an attacker to overwrite memory locations beyond the intended buffer boundaries. While the vulnerability alone causes memory corruption, it can be chained with other vulnerabilities to achieve arbitrary code execution within the context of the current process. The CVSS v3.1 score of 7.8 reflects a high impact on confidentiality, integrity, and availability, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The vulnerability is exploitable without privileges but requires the user to open or process the malicious PKT file through SubassemblyComposer.exe. No known exploits are currently reported in the wild, and no patches or vendor advisories are linked, though the vulnerability is publicly disclosed and enriched by CISA. The Subassembly Composer application is specialized software, and the vulnerability's exploitation could lead to severe consequences including unauthorized code execution, data compromise, or denial of service within affected environments.

Potential Impact

For European organizations using Subassembly Composer, this vulnerability poses a significant risk. The potential for arbitrary code execution could allow attackers to compromise sensitive project data, intellectual property, or disrupt critical workflows. Since the attack requires local access and user interaction, the threat is more pronounced in environments where users handle untrusted PKT files or where social engineering could be used to trick users into opening malicious files. The high impact on confidentiality, integrity, and availability means that successful exploitation could lead to data breaches, operational downtime, and loss of trust. Organizations in sectors such as engineering, manufacturing, or construction that rely on Subassembly Composer for design or assembly processes could face operational disruptions and financial losses. Additionally, the lack of available patches increases the urgency for mitigation. Given the European Union's strict data protection regulations (e.g., GDPR), any data compromise resulting from exploitation could also lead to regulatory penalties and reputational damage.

Mitigation Recommendations

1. Restrict usage of Subassembly Composer to trusted users and environments only, minimizing exposure to untrusted PKT files. 2. Implement strict file handling policies, including scanning and validating PKT files before opening them in the application. 3. Employ application whitelisting and sandboxing techniques to limit the execution context of SubassemblyComposer.exe, reducing the impact of potential exploitation. 4. Educate users about the risks of opening files from untrusted sources and enforce policies to avoid social engineering attacks. 5. Monitor system and application logs for unusual behavior indicative of exploitation attempts. 6. Since no patches are currently available, consider isolating or limiting the use of affected versions and evaluate alternative tools or updated versions once patches are released. 7. Maintain up-to-date endpoint protection solutions that may detect anomalous memory corruption or exploitation behaviors. 8. Coordinate with vendors or security advisories for updates or patches and apply them promptly upon release.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
autodesk
Date Reserved
2022-09-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aecab6

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 4:12:25 PM

Last updated: 8/13/2025, 4:34:31 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats