Vulnerability Database

328,409

Total vulnerabilities in the database

CVE-2021-40165

A maliciously crafted TIFF, PICT, TGA, or RLC file in Autodesk Image Processing component may be used to write beyond the allocated buffer while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.

  • Published: Oct 7, 2022
  • Updated: Nov 16, 2025
  • CVE: CVE-2021-40165
  • Severity: High
  • Exploit:

CVSS v3:

  • Severity: High
  • Score: 7.8
  • AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CWEs:

Software From Fixed in
autodesk / revit 2022 2022.x
autodesk / inventor 2022 2022.2
autodesk / autocad 2022 2022.1.2
autodesk / autocad_architecture 2022 2022.1.2
autodesk / autocad_electrical 2022 2022.1.2
autodesk / autocad_map_3d 2022 2022.1.2
autodesk / autocad_mechanical 2022 2022.1.2
autodesk / autocad_mep 2022 2022.1.2
autodesk / autocad_plant_3d 2022 2022.1.2
autodesk / autocad_lt 2022 2022.1.2
autodesk / design_review 2018-hotfix 2018-hotfix.x
autodesk / design_review 2018-hotfix2 2018-hotfix2.x
autodesk / design_review 2018-hotfix3 2018-hotfix3.x
autodesk / design_review 2018 2018.x
autodesk / dwg_trueview 2022 2022.1.1
autodesk / navisworks 2022 2022.2
autodesk / autocad 2019 2019.1.4
autodesk / autocad 2020 2020.1.5
autodesk / autocad 2021 2021.1.2
autodesk / autocad_architecture 2019 2019.1.4
autodesk / autocad_architecture 2020 2020.1.5
autodesk / autocad_architecture 2021 2021.1.2
autodesk / autocad_electrical 2019 2019.1.4
autodesk / autocad_electrical 2020 2020.1.5
autodesk / autocad_electrical 2021 2021.1.2
autodesk / autocad_map_3d 2021 2021.1.2
autodesk / autocad_map_3d 2020 2020.1.5
autodesk / autocad_map_3d 2019 2019.1.4
autodesk / autocad_mechanical 2019 2019.1.4
autodesk / autocad_mechanical 2020 2020.1.5
autodesk / autocad_mechanical 2021 2021.1.2
autodesk / autocad_mep 2021 2021.1.2
autodesk / autocad_mep 2020 2020.1.5
autodesk / autocad_mep 2019 2019.1.4
autodesk / autocad_plant_3d 2019 2019.1.4
autodesk / autocad_plant_3d 2020 2020.1.5
autodesk / autocad_plant_3d 2021 2021.1.2
autodesk / autocad_lt 2021 2021.1.2
autodesk / autocad_lt 2020 2020.1.5
autodesk / autocad_lt 2019 2019.1.4
autodesk / dwg_trueview 2019 2019.1.4
autodesk / dwg_trueview 2020 2020.1.5
autodesk / dwg_trueview 2021 2021.1.2
autodesk / autocad_lt 2022 2022.2.2
autodesk / infraworks 2019.3-hotfix_1 2019.3-hotfix_1.x
autodesk / infraworks 2019.3-hotfix_2 2019.3-hotfix_2.x
autodesk / infraworks 2019.3-hotfix_3 2019.3-hotfix_3.x
autodesk / infraworks 2019.3 2019.3.x
autodesk / infraworks 2019 2019.3
autodesk / infraworks 2020 2020.2
autodesk / infraworks 2020.2-hotfix_1 2020.2-hotfix_1.x
autodesk / infraworks 2020.2-hotfix_2 2020.2-hotfix_2.x
autodesk / infraworks 2020.2 2020.2.x
autodesk / infraworks 2021.2-hotfix_1 2021.2-hotfix_1.x
autodesk / infraworks 2021.2-hotfix_2 2021.2-hotfix_2.x
autodesk / infraworks 2021.2 2021.2.x
autodesk / infraworks 2021 2021.2
autodesk / infraworks 2022.0-hotfix_1 2022.0-hotfix_1.x
autodesk / infraworks 2022.1 2022.1.x
autodesk / inventor 2021 2021.4
autodesk / inventor 2020 2020.5
autodesk / inventor 2019 2019.6
autodesk / revit 2021 2021.1.5
autodesk / revit 2020 2020.2.6
autodesk / revit 2019 2019.2.4
autodesk / autocad_lt 2021 2021.2.2
autodesk / autocad_civil_3d 2021 2021.1.2
autodesk / autocad_civil_3d 2022 2022.1.2
autodesk / autocad_civil_3d 2020 2020.1.5
autodesk / autocad_civil_3d 2019 2019.1.4
autodesk / autocad_advance_steel 2022 2022.1.2
autodesk / autocad_advance_steel 2021 2021.1.2
autodesk / autocad_advance_steel 2020 2020.1.5
autodesk / autocad_advance_steel 2019 2019.1.4
autodesk / autocad_lt 2020 2020.3.2
autodesk / infraworks 2022.0 2022.0.x
autodesk / storm_and_sanitary_analysis 2021 2021.3.1
autodesk / storm_and_sanitary_analysis 2020 2020.3.1
autodesk / storm_and_sanitary_analysis 2022 2022.x
autodesk / infrastructure_parts_editor 2022 2022.x
autodesk / infrastructure_parts_editor 2021 2021.x
autodesk / infrastructure_parts_editor 2020 2020.0.2
autodesk / navisworks 2021 2021.4
autodesk / navisworks 2020 2020.5
autodesk / fusion 2.0.10356 2.0.11405
autodesk / infrastructure_parts_editor 2019 2019.2.2
autodesk / navisworks 2019 2019.7
autodesk / storm_and_sanitary_analysis 2019 2019.x

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.