CVE-2024-23132
Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A maliciously crafted STP file in atf_dwg_consumer.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Un archivo STP creado con fines malintencionados en atf_dwg_consumer.dll cuando se analiza mediante Autodesk AutoCAD podría provocar una vulnerabilidad de corrupción de memoria por infracción de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, podría provocar la ejecución de código en el contexto del proceso actual.
A maliciously crafted STP file in atf_dwg_consumer.dll when parsed through Autodesk applications can lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of STP files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-01-11 CVE Reserved
- 2024-02-12 CVE Published
- 2025-01-27 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
- CAPEC-100: Overflow Buffers
References (2)
URL | Tag | Source |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 | ||
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Autodesk Search vendor "Autodesk" | Autocad Search vendor "Autodesk" for product "Autocad" | * | - |
Affected
| ||||||
Autodesk Search vendor "Autodesk" | Autocad Advance Steel Search vendor "Autodesk" for product "Autocad Advance Steel" | * | - |
Affected
| ||||||
Autodesk Search vendor "Autodesk" | Autocad Civil 3d Search vendor "Autodesk" for product "Autocad Civil 3d" | * | - |
Affected
|