AUTODESK TRUST CENTER

Timely and transparent notice

Autodesk publishes important information regarding security vulnerabilities that could affect specific versions of Autodesk products or services.

Latest security bulletins and advisories

This page contains important information regarding security vulnerabilities that could affect specific versions of Autodesk products or services.

  • DWG Vulnerabilities in the Autodesk® Navisworks Desktop software

    Applications and Services that utilize Autodesk Navisworks may be affected by Out-of-bounds Read and Out-of-bounds Write vulnerabilities. Exploitation of these vulnerabilities could lead to code execution.

    Autodesk ID: ADSK-SA-2021-0009
    13/09/2021, Monday

  • PDF Vulnerabilities in the Autodesk® Navisworks Desktop software

    Applications and Services that utilize Autodesk Navisworks may be affected by Out-of-bounds Read, Memory Corruption vulnerabilities. Exploitation of these vulnerabilities could lead to code execution.

    Autodesk ID: ADSK-SA-2021-0008
    13/09/2021, Monday

  • Vulnerabilities in Autodesk® Infrastructure Parts Editor software

    Autodesk® Infrastructure Parts Editor has been affected by third party component vulnerabilities. Exploitation of these vulnerabilities could lead to code execution and/or denial-of-service.

    Autodesk ID: ADSK-SA-2021-0007
    31/08/2021, Tuesday

  • MAXScript exploit "MSCPROP.DLL" in Autodesk® 3ds Max® software

    A variant of a MAXScript exploit "MSCPROP.DLL" has been identified and a free plugin is now available in the Autodesk App Store to help detect and resolve potential issues caused by this malicious code.

    Autodesk ID: ADSK-SA-2021-0006
    15/07/2021, Thursday

  • Vulnerabilities in Autodesk® InfraWorks software

    Autodesk® InfraWorks has been affected by multiple vulnerabilities. Exploitation of these vulnerabilities could lead to remote code execution and/or denial-of-service to the software and user devices.

    Autodesk ID: ADSK-SA-2021-0005
    18/06/2021, Friday

  • Vulnerabilities in the Autodesk® AutoCAD® family of products

    Applications and Services that utilize Autodesk AutoCAD products are affected by Out-of-bound Read, Out-of-bound Write, and Memory Corruption vulnerabilities. Exploitation of these vulnerabilities could lead to arbitrary code execution.

    Autodesk ID: ADSK-SA-2021-0004
    17/06/2021, Thursday

  • Vulnerabilities in the Autodesk® Design Review software

    Applications and Services that utilize Autodesk Design Review may be affected by Double Free, Heap Overflow, Out-of-bound Read/Write, Use-After-Free, Type Confusion, and Uninitialized Variable vulnerabilities. Exploitation of these vulnerabilities could lead to remote code execution.

    Autodesk ID: ADSK-SA-2021-0003
    14/06/2021, Monday

  • Privilege Escalation Vulnerabilities in Autodesk® Licensing Service

    Autodesk® Desktop Licensing Installer has been affected by Privilege Escalation vulnerabilities. Exploitation of these vulnerabilities could lead to code execution due to weak permissions.

    Autodesk ID: ADSK-SA-2021-0002
    14/06/2021, Monday

  • Vulnerabilities in the Autodesk® FBX Review software

    Applications and Services that utilize the Autodesk FBX Review have been affected by Use-After-Free, Memory Corruption, Out-Of-Bounds Read, Untrusted Pointer Dereference, and Directory Traversal vulnerabilities. Exploitation of these vulnerabilities could lead to remote code execution and/or denial-of-service.

    Autodesk ID: ADSK-SA-2021-0001
    15/04/2021, Thursday

  • Use-After-Free and XML Entity Expansion Vulnerabilities in Autodesk® InfraWorks

    Autodesk® InfraWorks has been affected by Use-After-Free and XML Entity Expansion vulnerabilities. Exploitation of these vulnerabilities could lead to remote code execution and/or denial-of-service.

    Autodesk ID: ADSK-SA-2020-0006
    30/10/2020, Friday

  • MAXScript exploit "PhysXPluginMfx" in Autodesk® 3ds Max® software

    A variant of a MAXScript exploit "PhysXPluginMfx" has been identified and a free plugin is now available in the Autodesk App Store to help detect and resolve potential issues caused by this malicious code.

    Autodesk ID: ADSK-SA-2020-0005
    10/08/2020, Monday

  • Vulnerabilities in Autodesk® InfraWorks

    Autodesk InfraWorks has been affected by heap overflow, code injection, out-of-bounds read, and stack-based buffer overflow vulnerabilities in the libcurl component.

    Autodesk ID: ADSK-SA-2020-0004
    25/06/2020, Thursday

  • Script exploit in Autodesk® Maya

    A third-party malicious script was identified and a fix has been made available. The script can execute malicious code that can corrupt the Maya environment, cause data loss and instability, as well as spread to other systems.

    Autodesk ID: ADSK-SA-2020-0003
    20/05/2020, Wednesday

  • Vulnerabilities in the Autodesk® FBX Software Development Kit

    Applications and Services that utilize the FBX-SDK Ver. 2020.0 or earlier can be impacted by buffer overflow, type confusion, use-after-free, integer overflow, NULL pointer dereference, and heap overflow vulnerabilities.

    Autodesk ID: ADSK-SA-2020-0002
    15/04/2020, Wednesday

  • Improper Signature Validation Vulnerability in Autodesk® Dynamo BIM

    Autodesk® Dynamo BIM is affected by an improper signature validation vulnerability which may lead to code execution through maliciously crafted DLL files.

    Autodesk ID: ADSK-SA-2020-0001
    01/04/2020, Wednesday

  • MAXScript exploit in Autodesk® 3ds Max

    A variant of a MAXScript exploit was identified and a fix has been made available. The exploit can execute malicious code that can corrupt the 3ds Max environment, cause data loss and instability, as well as spread to other systems.

    Autodesk ID: ADSK-SA-2019-0005
    09/01/2020, Thursday

  • Vulnerability in the Autodesk® Desktop Application

    Autodesk Desktop Application is affected by a DLL preloading vulnerability.

    Autodesk ID: ADSK-SA-2019-0004
    29/11/2019, Friday

  • Vulnerability in the Autodesk FBX Software Development Kit

    FBX is affected by a buffer overflow vulnerability which may lead to arbitrary code execution on a system running it.

    Autodesk ID: ADSK-SA-2019-0003
    31/10/2019, Wednesday

  • Vulnerabilities in Autodesk AutoCAD and Design Review Products

    Multiple Autodesk products have been affected by DLL preloading and use-after-free vulnerabilities.

    Autodesk ID: ADSK-SA-2019-0002
    16/08/2019, Friday

  • Vulnerabilities in the Autodesk AutoCAD products

    Multiple Autodesk® AutoCAD® products have been affected by heap overflow, use-after-free, and deserialization vulnerabilities.

    Autodesk ID: ADSK-SA-2019-0001
    14/02/2019, Thursday

  • Denial of Service Vulnerabilities in the Autodesk Backburner Rendering Management Software

    The Autodesk® Backburner 2016 service command line interface accepts a set of remote telnet commands. When insufficient number of arguments are passed, it fails to handle a specific command request which results in an unhandled Null Dereference state/crash leading to Denial of Service condition.

    Autodesk ID: ADSK-SA-2017-001
    17/02/2017, Friday

  • Vulnerabilities in Autodesk Design Review 2013

    Vulnerabilities were identified in the Autodesk® Design Review 2013 application that can result in arbitrary and unauthorized remote code execution.

    Autodesk ID: ADSK-SA-2016-02
    14/12/2016, Wednesday

  • Vulnerabilities in the Autodesk FBX Software Development Kit

    Applications and Services that utilize the Autodesk® FBX-SDK Ver. 2017.0 or earlier for processing FBX, DXF, DAE and 3DS formatted files can be impacted by vulnerabilities related to improper memory allocation when opening malformed files.

    Autodesk ID: ADSK-SA-2016-01
    05/12/2016, Monday

Help us stay secure

REPORT A SECURITY INCIDENT

Help us protect our applications by reporting a security incident, bug, or vulnerability found within an Autodesk product or service.

USE GENUINE AUTODESK LICENSES

Avoid software failure, increased exposure to malware, and associated risks by using genuine Autodesk software. Visit Autodesk Genuine to learn more.

Welcome ${RESELLERNAME} Customers

Please opt-in to receive reseller support

I agree that Autodesk may share my name and email address with ${RESELLERNAME} so that ${RESELLERNAME} may provide installation support and send me marketing communications.  I understand that the Reseller will be the party responsible for how this data will be used and managed.

Email is required Entered email is invalid.

${RESELLERNAME}