CVE-2022-41305: Memory Corruption in Subassembly Composer
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
AI Analysis
Technical Summary
CVE-2022-41305 is a high-severity memory corruption vulnerability identified in the Subassembly Composer application, affecting versions from 2020 through 2023. The vulnerability arises when the application processes a maliciously crafted PKT file, leading to a write access violation that causes memory corruption. This type of vulnerability is classified under CWE-787 (Out-of-bounds Write), which typically allows an attacker to overwrite memory locations beyond the intended buffer boundaries. While the vulnerability alone causes memory corruption, it can be chained with other vulnerabilities to achieve arbitrary code execution within the context of the current process. The CVSS v3.1 score of 7.8 reflects a high impact on confidentiality, integrity, and availability, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The vulnerability is exploitable without privileges but requires the user to open or process the malicious PKT file through SubassemblyComposer.exe. No known exploits are currently reported in the wild, and no patches or vendor advisories are linked, though the vulnerability is publicly disclosed and enriched by CISA. The Subassembly Composer application is specialized software, and the vulnerability's exploitation could lead to severe consequences including unauthorized code execution, data compromise, or denial of service within affected environments.
Potential Impact
For European organizations using Subassembly Composer, this vulnerability poses a significant risk. The potential for arbitrary code execution could allow attackers to compromise sensitive project data, intellectual property, or disrupt critical workflows. Since the attack requires local access and user interaction, the threat is more pronounced in environments where users handle untrusted PKT files or where social engineering could be used to trick users into opening malicious files. The high impact on confidentiality, integrity, and availability means that successful exploitation could lead to data breaches, operational downtime, and loss of trust. Organizations in sectors such as engineering, manufacturing, or construction that rely on Subassembly Composer for design or assembly processes could face operational disruptions and financial losses. Additionally, the lack of available patches increases the urgency for mitigation. Given the European Union's strict data protection regulations (e.g., GDPR), any data compromise resulting from exploitation could also lead to regulatory penalties and reputational damage.
Mitigation Recommendations
1. Restrict usage of Subassembly Composer to trusted users and environments only, minimizing exposure to untrusted PKT files. 2. Implement strict file handling policies, including scanning and validating PKT files before opening them in the application. 3. Employ application whitelisting and sandboxing techniques to limit the execution context of SubassemblyComposer.exe, reducing the impact of potential exploitation. 4. Educate users about the risks of opening files from untrusted sources and enforce policies to avoid social engineering attacks. 5. Monitor system and application logs for unusual behavior indicative of exploitation attempts. 6. Since no patches are currently available, consider isolating or limiting the use of affected versions and evaluate alternative tools or updated versions once patches are released. 7. Maintain up-to-date endpoint protection solutions that may detect anomalous memory corruption or exploitation behaviors. 8. Coordinate with vendors or security advisories for updates or patches and apply them promptly upon release.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Czech Republic
CVE-2022-41305: Memory Corruption in Subassembly Composer
Description
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
AI-Powered Analysis
Technical Analysis
CVE-2022-41305 is a high-severity memory corruption vulnerability identified in the Subassembly Composer application, affecting versions from 2020 through 2023. The vulnerability arises when the application processes a maliciously crafted PKT file, leading to a write access violation that causes memory corruption. This type of vulnerability is classified under CWE-787 (Out-of-bounds Write), which typically allows an attacker to overwrite memory locations beyond the intended buffer boundaries. While the vulnerability alone causes memory corruption, it can be chained with other vulnerabilities to achieve arbitrary code execution within the context of the current process. The CVSS v3.1 score of 7.8 reflects a high impact on confidentiality, integrity, and availability, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The vulnerability is exploitable without privileges but requires the user to open or process the malicious PKT file through SubassemblyComposer.exe. No known exploits are currently reported in the wild, and no patches or vendor advisories are linked, though the vulnerability is publicly disclosed and enriched by CISA. The Subassembly Composer application is specialized software, and the vulnerability's exploitation could lead to severe consequences including unauthorized code execution, data compromise, or denial of service within affected environments.
Potential Impact
For European organizations using Subassembly Composer, this vulnerability poses a significant risk. The potential for arbitrary code execution could allow attackers to compromise sensitive project data, intellectual property, or disrupt critical workflows. Since the attack requires local access and user interaction, the threat is more pronounced in environments where users handle untrusted PKT files or where social engineering could be used to trick users into opening malicious files. The high impact on confidentiality, integrity, and availability means that successful exploitation could lead to data breaches, operational downtime, and loss of trust. Organizations in sectors such as engineering, manufacturing, or construction that rely on Subassembly Composer for design or assembly processes could face operational disruptions and financial losses. Additionally, the lack of available patches increases the urgency for mitigation. Given the European Union's strict data protection regulations (e.g., GDPR), any data compromise resulting from exploitation could also lead to regulatory penalties and reputational damage.
Mitigation Recommendations
1. Restrict usage of Subassembly Composer to trusted users and environments only, minimizing exposure to untrusted PKT files. 2. Implement strict file handling policies, including scanning and validating PKT files before opening them in the application. 3. Employ application whitelisting and sandboxing techniques to limit the execution context of SubassemblyComposer.exe, reducing the impact of potential exploitation. 4. Educate users about the risks of opening files from untrusted sources and enforce policies to avoid social engineering attacks. 5. Monitor system and application logs for unusual behavior indicative of exploitation attempts. 6. Since no patches are currently available, consider isolating or limiting the use of affected versions and evaluate alternative tools or updated versions once patches are released. 7. Maintain up-to-date endpoint protection solutions that may detect anomalous memory corruption or exploitation behaviors. 8. Coordinate with vendors or security advisories for updates or patches and apply them promptly upon release.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- autodesk
- Date Reserved
- 2022-09-21T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aecab6
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 4:12:25 PM
Last updated: 2/7/2026, 2:41:06 AM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.