CVE-2022-41305: Memory Corruption in Subassembly Composer
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
AI Analysis
Technical Summary
CVE-2022-41305 is a high-severity memory corruption vulnerability identified in the Subassembly Composer application, affecting versions from 2020 through 2023. The vulnerability arises when the application processes a maliciously crafted PKT file, leading to a write access violation that causes memory corruption. This type of vulnerability is classified under CWE-787 (Out-of-bounds Write), which typically allows an attacker to overwrite memory locations beyond the intended buffer boundaries. While the vulnerability alone causes memory corruption, it can be chained with other vulnerabilities to achieve arbitrary code execution within the context of the current process. The CVSS v3.1 score of 7.8 reflects a high impact on confidentiality, integrity, and availability, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The vulnerability is exploitable without privileges but requires the user to open or process the malicious PKT file through SubassemblyComposer.exe. No known exploits are currently reported in the wild, and no patches or vendor advisories are linked, though the vulnerability is publicly disclosed and enriched by CISA. The Subassembly Composer application is specialized software, and the vulnerability's exploitation could lead to severe consequences including unauthorized code execution, data compromise, or denial of service within affected environments.
Potential Impact
For European organizations using Subassembly Composer, this vulnerability poses a significant risk. The potential for arbitrary code execution could allow attackers to compromise sensitive project data, intellectual property, or disrupt critical workflows. Since the attack requires local access and user interaction, the threat is more pronounced in environments where users handle untrusted PKT files or where social engineering could be used to trick users into opening malicious files. The high impact on confidentiality, integrity, and availability means that successful exploitation could lead to data breaches, operational downtime, and loss of trust. Organizations in sectors such as engineering, manufacturing, or construction that rely on Subassembly Composer for design or assembly processes could face operational disruptions and financial losses. Additionally, the lack of available patches increases the urgency for mitigation. Given the European Union's strict data protection regulations (e.g., GDPR), any data compromise resulting from exploitation could also lead to regulatory penalties and reputational damage.
Mitigation Recommendations
1. Restrict usage of Subassembly Composer to trusted users and environments only, minimizing exposure to untrusted PKT files. 2. Implement strict file handling policies, including scanning and validating PKT files before opening them in the application. 3. Employ application whitelisting and sandboxing techniques to limit the execution context of SubassemblyComposer.exe, reducing the impact of potential exploitation. 4. Educate users about the risks of opening files from untrusted sources and enforce policies to avoid social engineering attacks. 5. Monitor system and application logs for unusual behavior indicative of exploitation attempts. 6. Since no patches are currently available, consider isolating or limiting the use of affected versions and evaluate alternative tools or updated versions once patches are released. 7. Maintain up-to-date endpoint protection solutions that may detect anomalous memory corruption or exploitation behaviors. 8. Coordinate with vendors or security advisories for updates or patches and apply them promptly upon release.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Czech Republic
CVE-2022-41305: Memory Corruption in Subassembly Composer
Description
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
AI-Powered Analysis
Technical Analysis
CVE-2022-41305 is a high-severity memory corruption vulnerability identified in the Subassembly Composer application, affecting versions from 2020 through 2023. The vulnerability arises when the application processes a maliciously crafted PKT file, leading to a write access violation that causes memory corruption. This type of vulnerability is classified under CWE-787 (Out-of-bounds Write), which typically allows an attacker to overwrite memory locations beyond the intended buffer boundaries. While the vulnerability alone causes memory corruption, it can be chained with other vulnerabilities to achieve arbitrary code execution within the context of the current process. The CVSS v3.1 score of 7.8 reflects a high impact on confidentiality, integrity, and availability, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The vulnerability is exploitable without privileges but requires the user to open or process the malicious PKT file through SubassemblyComposer.exe. No known exploits are currently reported in the wild, and no patches or vendor advisories are linked, though the vulnerability is publicly disclosed and enriched by CISA. The Subassembly Composer application is specialized software, and the vulnerability's exploitation could lead to severe consequences including unauthorized code execution, data compromise, or denial of service within affected environments.
Potential Impact
For European organizations using Subassembly Composer, this vulnerability poses a significant risk. The potential for arbitrary code execution could allow attackers to compromise sensitive project data, intellectual property, or disrupt critical workflows. Since the attack requires local access and user interaction, the threat is more pronounced in environments where users handle untrusted PKT files or where social engineering could be used to trick users into opening malicious files. The high impact on confidentiality, integrity, and availability means that successful exploitation could lead to data breaches, operational downtime, and loss of trust. Organizations in sectors such as engineering, manufacturing, or construction that rely on Subassembly Composer for design or assembly processes could face operational disruptions and financial losses. Additionally, the lack of available patches increases the urgency for mitigation. Given the European Union's strict data protection regulations (e.g., GDPR), any data compromise resulting from exploitation could also lead to regulatory penalties and reputational damage.
Mitigation Recommendations
1. Restrict usage of Subassembly Composer to trusted users and environments only, minimizing exposure to untrusted PKT files. 2. Implement strict file handling policies, including scanning and validating PKT files before opening them in the application. 3. Employ application whitelisting and sandboxing techniques to limit the execution context of SubassemblyComposer.exe, reducing the impact of potential exploitation. 4. Educate users about the risks of opening files from untrusted sources and enforce policies to avoid social engineering attacks. 5. Monitor system and application logs for unusual behavior indicative of exploitation attempts. 6. Since no patches are currently available, consider isolating or limiting the use of affected versions and evaluate alternative tools or updated versions once patches are released. 7. Maintain up-to-date endpoint protection solutions that may detect anomalous memory corruption or exploitation behaviors. 8. Coordinate with vendors or security advisories for updates or patches and apply them promptly upon release.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- autodesk
- Date Reserved
- 2022-09-21T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aecab6
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 4:12:25 PM
Last updated: 8/13/2025, 4:34:31 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.