First published: Thu Nov 23 2023(Updated: )
A maliciously crafted PRT file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to cause a Heap-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk AutoCAD LT for macOS | <2024.1 | |
Autodesk AutoCAD 2024 | >=2023.0.0<2023.1.4 | |
Autodesk AutoCAD 2024 | >=2024.0.0<2024.1.1 | |
Autodesk AutoCAD Advance Steel | <2023.1.4 | |
Autodesk AutoCAD Advance Steel | >=2024.0.0<2024.1.1 | |
AutoCAD | <2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 | |
Autodesk Civil 3D | <2023.1.4 | |
Autodesk Civil 3D | >=2024.0.0<2024.1.1 | |
AutoCAD | <2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 | |
AutoCAD LT | <2023.1.4 | |
Autodesk AutoCAD LT for macOS | <2024.1 | |
AutoCAD LT | >=2024.0.0<2024.1.1 | |
AutoCAD | <2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 | |
AutoCAD | <2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 | |
AutoCAD | <2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 | |
AutoCAD | <2023.1.4 | |
AutoCAD | >=2024.0.0<2024.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41140 is a vulnerability associated with Autodesk AutoCAD 2024 and 2023 that can be exploited through a maliciously crafted PRT file to cause a Heap-Based Buffer Overflow, leading to a crash, unauthorized data access, or arbitrary code execution.
CVE-2023-41140 has a severity rating of 7.8 (high).
Autodesk AutoCAD versions 2024.1 and prior, as well as versions 2023.0.0 to 2023.1.4, are affected by CVE-2023-41140.
CVE-2023-41140 can be exploited by parsing a maliciously crafted PRT file through Autodesk AutoCAD 2024 and 2023.
To mitigate the risk of CVE-2023-41140, it is recommended to update to the latest version of Autodesk AutoCAD or apply the necessary patches provided by Autodesk.