Risk | High |
Patch available | NO |
Number of vulnerabilities | 11 |
CVE-ID | CVE-2024-23150 CVE-2024-23151 CVE-2024-23152 CVE-2024-23153 CVE-2024-23154 CVE-2024-23155 CVE-2024-23156 CVE-2024-23157 CVE-2024-23158 CVE-2024-23159 CVE-2024-36999 |
CWE-ID | CWE-787 CWE-125 CWE-122 CWE-119 CWE-416 CWE-457 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Autodesk AutoCAD Other software / Other software solutions AutoCAD Architecture Client/Desktop applications / Multimedia software AutoCAD Electrical Client/Desktop applications / Multimedia software AutoCAD Map 3D Client/Desktop applications / Multimedia software AutoCAD Mechanical Client/Desktop applications / Multimedia software AutoCAD MEP Client/Desktop applications / Multimedia software AutoCAD Plant 3D Client/Desktop applications / Multimedia software Autodesk Civil 3D Client/Desktop applications / Multimedia software Advance Steel Client/Desktop applications / Multimedia software |
Vendor | Autodesk |
Security Bulletin
This security bulletin contains information about 11 vulnerabilities.
EUVDB-ID: #VU92230
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-23150
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing PRT files in odxug_dll.dll. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAutodesk AutoCAD: 2024 - 2024.1.4
AutoCAD Architecture: 2024 - 2024.1.4
AutoCAD Electrical: 2024 - 2024.1.4
AutoCAD Map 3D: 2024 - 2024.1.4
AutoCAD Mechanical: 2024 - 2024.1.4
AutoCAD MEP: 2024 - 2024.1.4
AutoCAD Plant 3D: 2024 - 2024.1.4
Autodesk Civil 3D: 2024 - 2024.1.4
Advance Steel: 2024 - 2024.1.4
CPE2.3https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010
https://www.zerodayinitiative.com/advisories/ZDI-24-792/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92231
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-23151
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing 3DM files in ASMkern229A.dll. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAutodesk AutoCAD: 2024 - 2024.1.4
AutoCAD Architecture: 2024 - 2024.1.4
AutoCAD Electrical: 2024 - 2024.1.4
AutoCAD Map 3D: 2024 - 2024.1.4
AutoCAD Mechanical: 2024 - 2024.1.4
AutoCAD MEP: 2024 - 2024.1.4
AutoCAD Plant 3D: 2024 - 2024.1.4
Autodesk Civil 3D: 2024 - 2024.1.4
Advance Steel: 2024 - 2024.1.4
CPE2.3https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010
https://www.zerodayinitiative.com/advisories/ZDI-24-793/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92232
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-23152
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing 3DM files in opennurbs.dll. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds read and execute arbitrary code on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAutodesk AutoCAD: 2024 - 2024.1.4
AutoCAD Architecture: 2024 - 2024.1.4
AutoCAD Electrical: 2024 - 2024.1.4
AutoCAD Map 3D: 2024 - 2024.1.4
AutoCAD Mechanical: 2024 - 2024.1.4
AutoCAD MEP: 2024 - 2024.1.4
AutoCAD Plant 3D: 2024 - 2024.1.4
Autodesk Civil 3D: 2024 - 2024.1.4
Advance Steel: 2024 - 2024.1.4
CPE2.3https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010
https://www.zerodayinitiative.com/advisories/ZDI-24-797/
https://www.zerodayinitiative.com/advisories/ZDI-24-791/
https://www.zerodayinitiative.com/advisories/ZDI-24-788/
https://www.zerodayinitiative.com/advisories/ZDI-24-960/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92233
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-23153
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing MODEL files in libodx.dll. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds read and execute arbitrary code on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAutodesk AutoCAD: 2024 - 2024.1.4
AutoCAD Architecture: 2024 - 2024.1.4
AutoCAD Electrical: 2024 - 2024.1.4
AutoCAD Map 3D: 2024 - 2024.1.4
AutoCAD Mechanical: 2024 - 2024.1.4
AutoCAD MEP: 2024 - 2024.1.4
AutoCAD Plant 3D: 2024 - 2024.1.4
Autodesk Civil 3D: 2024 - 2024.1.4
Advance Steel: 2024 - 2024.1.4
CPE2.3https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010
https://www.zerodayinitiative.com/advisories/ZDI-24-795/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92234
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-23154
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing SLDPRT files in ODXSW_DLL.dll. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAutodesk AutoCAD: 2024 - 2024.1.4
AutoCAD Architecture: 2024 - 2024.1.4
AutoCAD Electrical: 2024 - 2024.1.4
AutoCAD Map 3D: 2024 - 2024.1.4
AutoCAD Mechanical: 2024 - 2024.1.4
AutoCAD MEP: 2024 - 2024.1.4
AutoCAD Plant 3D: 2024 - 2024.1.4
Autodesk Civil 3D: 2024 - 2024.1.4
Advance Steel: 2024 - 2024.1.4
CPE2.3https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010
https://www.zerodayinitiative.com/advisories/ZDI-24-790/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92235
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-23155
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing MODEL files in atf_asm_interface.dll. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAutodesk AutoCAD: 2024 - 2024.1.4
AutoCAD Architecture: 2024 - 2024.1.4
AutoCAD Electrical: 2024 - 2024.1.4
AutoCAD Map 3D: 2024 - 2024.1.4
AutoCAD Mechanical: 2024 - 2024.1.4
AutoCAD MEP: 2024 - 2024.1.4
AutoCAD Plant 3D: 2024 - 2024.1.4
Autodesk Civil 3D: 2024 - 2024.1.4
Advance Steel: 2024 - 2024.1.4
CPE2.3https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010
https://www.zerodayinitiative.com/advisories/ZDI-24-787/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92236
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-23156
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing 3DM files in opennurbs.dll. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAutodesk AutoCAD: 2024 - 2024.1.4
AutoCAD Architecture: 2024 - 2024.1.4
AutoCAD Electrical: 2024 - 2024.1.4
AutoCAD Map 3D: 2024 - 2024.1.4
AutoCAD Mechanical: 2024 - 2024.1.4
AutoCAD MEP: 2024 - 2024.1.4
AutoCAD Plant 3D: 2024 - 2024.1.4
Autodesk Civil 3D: 2024 - 2024.1.4
Advance Steel: 2024 - 2024.1.4
CPE2.3https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010
https://www.zerodayinitiative.com/advisories/ZDI-24-799/
https://www.zerodayinitiative.com/advisories/ZDI-24-796/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92240
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-23157
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing SLDASM and SLDPRT files in ODXSW_DLL.dll. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAutodesk AutoCAD: 2024 - 2024.1.4
AutoCAD Architecture: 2024 - 2024.1.4
AutoCAD Electrical: 2024 - 2024.1.4
AutoCAD Map 3D: 2024 - 2024.1.4
AutoCAD Mechanical: 2024 - 2024.1.4
AutoCAD MEP: 2024 - 2024.1.4
AutoCAD Plant 3D: 2024 - 2024.1.4
Autodesk Civil 3D: 2024 - 2024.1.4
Advance Steel: 2024 - 2024.1.4
CPE2.3https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010
https://www.zerodayinitiative.com/advisories/ZDI-24-800/
https://www.zerodayinitiative.com/advisories/ZDI-24-685/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92237
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-23158
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when parsing IGES files in ASMImport229A.dll. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAutodesk AutoCAD: 2024 - 2024.1.4
AutoCAD Architecture: 2024 - 2024.1.4
AutoCAD Electrical: 2024 - 2024.1.4
AutoCAD Map 3D: 2024 - 2024.1.4
AutoCAD Mechanical: 2024 - 2024.1.4
AutoCAD MEP: 2024 - 2024.1.4
AutoCAD Plant 3D: 2024 - 2024.1.4
Autodesk Civil 3D: 2024 - 2024.1.4
Advance Steel: 2024 - 2024.1.4
CPE2.3https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010
https://www.zerodayinitiative.com/advisories/ZDI-24-798/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92238
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-23159
CWE-ID:
CWE-457 - Use of Uninitialized Variable
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing STP files in stp_aim_x64_vc15d.dll. A remote attacker can create a specially crafted file, trick the victim into opening it and execute arbitrary code on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAutodesk AutoCAD: 2024 - 2024.1.4
AutoCAD Architecture: 2024 - 2024.1.4
AutoCAD Electrical: 2024 - 2024.1.4
AutoCAD Map 3D: 2024 - 2024.1.4
AutoCAD Mechanical: 2024 - 2024.1.4
AutoCAD MEP: 2024 - 2024.1.4
AutoCAD Plant 3D: 2024 - 2024.1.4
Autodesk Civil 3D: 2024 - 2024.1.4
Advance Steel: 2024 - 2024.1.4
CPE2.3https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010
https://www.zerodayinitiative.com/advisories/ZDI-24-794/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92239
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-36999
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing 3DM files in opennurbs.dll. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAutodesk AutoCAD: 2024 - 2024.1.4
AutoCAD Architecture: 2024 - 2024.1.4
AutoCAD Electrical: 2024 - 2024.1.4
AutoCAD Map 3D: 2024 - 2024.1.4
AutoCAD Mechanical: 2024 - 2024.1.4
AutoCAD MEP: 2024 - 2024.1.4
AutoCAD Plant 3D: 2024 - 2024.1.4
Autodesk Civil 3D: 2024 - 2024.1.4
Advance Steel: 2024 - 2024.1.4
CPE2.3https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010
https://www.zerodayinitiative.com/advisories/ZDI-24-789/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.