CVE-2024-23126
Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A maliciously crafted CATPART file in CC5Dll.dll when parsed through Autodesk AutoCAD can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
Un archivo CATPART creado con fines malintencionados cuando se analiza CC5Dll.dll a través de Autodesk AutoCAD se puede utilizar para provocar un desbordamiento en la región stack de la memoria. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar código arbitrario en el contexto del proceso actual.
A maliciously crafted CATPART file when parsed CC5Dll.dll through Autodesk applications can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of CATPART files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-01-11 CVE Reserved
- 2024-02-12 CVE Published
- 2025-01-30 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-121: Stack-based Buffer Overflow
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 | ||
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Autodesk Search vendor "Autodesk" | Autocad Search vendor "Autodesk" for product "Autocad" | * | - |
Affected
| ||||||
Autodesk Search vendor "Autodesk" | Autocad Advance Steel Search vendor "Autodesk" for product "Autocad Advance Steel" | * | - |
Affected
| ||||||
Autodesk Search vendor "Autodesk" | Autocad Civil 3d Search vendor "Autodesk" for product "Autocad Civil 3d" | * | - |
Affected
|