First published: Wed Nov 22 2023(Updated: )
A maliciously crafted DLL file can be forced to install onto a non-default location, and attacker can overwrite parts of the product with malicious DLLs. These files may then have elevated privileges leading to a Privilege Escalation vulnerability.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk Desktop Connector | <=16.2.1.2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29069 is a vulnerability that allows a malicious DLL file to install onto a non-default location, allowing an attacker to overwrite parts of the product with malicious DLLs and potentially leading to Privilege Escalation.
Autodesk Desktop Connector versions up to and including 16.2.1.2016 are affected by CVE-2023-29069.
CVE-2023-29069 has a severity rating of 7.8 (High).
An attacker can exploit CVE-2023-29069 by crafting a malicious DLL file and forcing it to install onto a non-default location, allowing them to overwrite parts of the product with malicious DLLs and potentially gain elevated privileges.
To protect against CVE-2023-29069, it is recommended to update Autodesk Desktop Connector to a version that is not affected by the vulnerability.