Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-3665


Unspecified vulnerability in Autodesk AutoCAD through 2014, AutoCAD LT through 2014, and DWG TrueView through 2014 allows remote attackers to execute arbitrary code via a crafted DWG file.


Security Impact Summary

CVE-2013-3665 is a security vulnerability that . Impacting 14 products from autodesk, from autodesk, from autodesk and 11 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Documented in 2013, this vulnerability occurred amid the cloud computing expansion era, where traditional network perimeter security models were being reevaluated. Organizations were transitioning from isolated infrastructure to interconnected systems, creating new attack surfaces that vulnerabilities like this could exploit.


Published

2013-07-18T16:51:38.953

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application autodesk autocad 2011 Yes
Application autodesk autocad 2012 Yes
Application autodesk autocad 2013 Yes
Application autodesk autocad 2014 Yes
Application autodesk autocad_architecture 2011 Yes
Application autodesk autocad_architecture 2012 Yes
Application autodesk autocad_architecture 2013 Yes
Application autodesk autocad_architecture 2014 Yes
Application autodesk autocad_civil_3d 2011 Yes
Application autodesk autocad_civil_3d 2012 Yes
Application autodesk autocad_civil_3d 2013 Yes
Application autodesk autocad_civil_3d 2014 Yes
Application autodesk autocad_ecscad 2011 Yes
Application autodesk autocad_ecscad 2012 Yes
Application autodesk autocad_ecscad 2013 Yes
Application autodesk autocad_ecscad 2014 Yes
Application autodesk autocad_electrical 2011 Yes
Application autodesk autocad_electrical 2012 Yes
Application autodesk autocad_electrical 2013 Yes
Application autodesk autocad_electrical 2014 Yes
Application autodesk autocad_lt 2011 Yes
Application autodesk autocad_lt 2012 Yes
Application autodesk autocad_lt 2013 Yes
Application autodesk autocad_lt 2014 Yes
Application autodesk autocad_map_3d 2011 Yes
Application autodesk autocad_map_3d 2012 Yes
Application autodesk autocad_map_3d 2013 Yes
Application autodesk autocad_map_3d 2014 Yes
Application autodesk autocad_mechanical 2011 Yes
Application autodesk autocad_mechanical 2012 Yes
Application autodesk autocad_mechanical 2013 Yes
Application autodesk autocad_mechanical 2014 Yes
Application autodesk autocad_mep 2011 Yes
Application autodesk autocad_mep 2012 Yes
Application autodesk autocad_mep 2013 Yes
Application autodesk autocad_mep 2014 Yes
Application autodesk autocad_p\&id 2011 Yes
Application autodesk autocad_p\&id 2012 Yes
Application autodesk autocad_p\&id 2013 Yes
Application autodesk autocad_p\&id 2014 Yes
Application autodesk autocad_plant_3d 2011 Yes
Application autodesk autocad_plant_3d 2012 Yes
Application autodesk autocad_plant_3d 2013 Yes
Application autodesk autocad_plant_3d 2014 Yes
Application autodesk autocad_structural_detailing 2011 Yes
Application autodesk autocad_structural_detailing 2012 Yes
Application autodesk autocad_structural_detailing 2013 Yes
Application autodesk autocad_structural_detailing 2014 Yes
Application autodesk autocad_utility_design 2011 Yes
Application autodesk autocad_utility_design 2012 Yes
Application autodesk autocad_utility_design 2013 Yes
Application autodesk autocad_utility_design 2014 Yes
Application autodesk dwg_trueview 2011 Yes
Application autodesk dwg_trueview 2012 Yes
Application autodesk dwg_trueview 2013 Yes
Application autodesk dwg_trueview 2014 Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For autodesk's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.