First published: Thu Nov 23 2023(Updated: )
A maliciously crafted STP file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to dereference an untrusted pointer. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk AutoCAD LT for macOS | <2024.1 | |
AutoCAD | >=2023.0.0<2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 | |
Autodesk AutoCAD Advance Steel | <2023.1.4 | |
Autodesk AutoCAD Advance Steel | >=2024.0.0<2024.1.1 | |
AutoCAD | <2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 | |
Autodesk Civil 3D | <2023.1.4 | |
Autodesk Civil 3D | >=2024.0.0<2024.1.1 | |
AutoCAD | <2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 | |
AutoCAD LT | <2023.1.4 | |
Autodesk AutoCAD LT for macOS | <2024.1 | |
AutoCAD LT | >=2024.0.0<2024.1.1 | |
AutoCAD | <2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 | |
AutoCAD | <2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 | |
AutoCAD | <2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 | |
AutoCAD | <2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-41139.
Autodesk AutoCAD 2024 and Autodesk AutoCAD 2023 are affected by CVE-2023-41139.
The severity of CVE-2023-41139 is high with a CVSS score of 7.8.
CVE-2023-41139 can be exploited by parsing a maliciously crafted STP file in Autodesk AutoCAD 2024 and 2023, which can lead to code execution in the current process.
Yes, Autodesk has released a security advisory with details on how to mitigate the vulnerability. Please refer to the reference link for more information.