Keyboard ALT + g to toggle grid overlay
This page contains important information regarding security vulnerabilities that could affect specific versions of Autodesk products or services.
Applications and Services that utilize the Autodesk FBX Review have been affected by Use-After-Free, Memory Corruption, Out-Of-Bounds Read, Untrusted Pointer Dereference, and Directory Traversal vulnerabilities. Exploitation of these vulnerabilities could lead to remote code execution and/or denial-of-service.
Autodesk ID: ADSK-SA-2021-0001
Autodesk® InfraWorks has been affected by Use-After-Free and XML Entity Expansion vulnerabilities. Exploitation of these vulnerabilities could lead to remote code execution and/or denial-of-service.
Autodesk ID: ADSK-SA-2020-0006
A variant of a MAXScript exploit "PhysXPluginMfx" has been identified and a free plugin is now available in the Autodesk App Store to help detect and resolve potential issues caused by this malicious code.
Autodesk ID: ADSK-SA-2020-0005
Autodesk InfraWorks has been affected by heap overflow, code injection, out-of-bounds read, and stack-based buffer overflow vulnerabilities in the libcurl component.
Autodesk ID: ADSK-SA-2020-0004
A third-party malicious script was identified and a fix has been made available. The script can execute malicious code that can corrupt the Maya environment, cause data loss and instability, as well as spread to other systems.
Autodesk ID: ADSK-SA-2020-0003
Applications and Services that utilize the FBX-SDK Ver. 2020.0 or earlier can be impacted by buffer overflow, type confusion, use-after-free, integer overflow, NULL pointer dereference, and heap overflow vulnerabilities.
Autodesk ID: ADSK-SA-2020-0002
Autodesk® Dynamo BIM is affected by an improper signature validation vulnerability which may lead to code execution through maliciously crafted DLL files.
Autodesk ID: ADSK-SA-2020-0001
A variant of a MAXScript exploit was identified and a fix has been made available. The exploit can execute malicious code that can corrupt the 3ds Max environment, cause data loss and instability, as well as spread to other systems.
Autodesk ID: ADSK-SA-2019-0005
Autodesk Desktop Application is affected by a DLL preloading vulnerability.
Autodesk ID: ADSK-SA-2019-0004
FBX is affected by a buffer overflow vulnerability which may lead to arbitrary code execution on a system running it.
Autodesk ID: ADSK-SA-2019-0003
Multiple Autodesk products have been affected by DLL preloading and use-after-free vulnerabilities.
Autodesk ID: ADSK-SA-2019-0002
Multiple Autodesk® AutoCAD® products have been affected by heap overflow, use-after-free, and deserialization vulnerabilities.
Autodesk ID: ADSK-SA-2019-0001
The Autodesk® Backburner 2016 service command line interface accepts a set of remote telnet commands. When insufficient number of arguments are passed, it fails to handle a specific command request which results in an unhandled Null Dereference state/crash leading to Denial of Service condition.
Autodesk ID: ADSK-SA-2017-001
Applications and Services that utilize the Autodesk® FBX-SDK Ver. 2017.0 or earlier for processing FBX, DXF, DAE and 3DS formatted files can be impacted by vulnerabilities related to improper memory allocation when opening malformed files.
Autodesk ID: ADSK-SA-2016-01
Vulnerabilities were identified in the Autodesk® Design Review 2013 application that can result in arbitrary and unauthorized remote code execution.
Autodesk ID: ADSK-SA-2016-02