First published: Wed Feb 21 2024(Updated: )
A maliciously crafted STP and STEP file, when parsed in ASMIMPORT228A.dll and ASMIMPORT229A.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
AutoCAD |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23120 is classified as a critical vulnerability due to its potential for data corruption and arbitrary code execution.
To mitigate CVE-2024-23120, ensure that you apply the latest security patches and updates provided by Autodesk for AutoCAD.
CVE-2024-23120 is exploited through specially crafted STP and STEP files that, when processed by Autodesk AutoCAD, trigger the vulnerability.
CVE-2024-23120 affects various versions of Autodesk AutoCAD that utilize the ASMIMPORT228A.dll and ASMIMPORT229A.dll components.
Exploiting CVE-2024-23120 can lead to application crashes, data corruption, or execution of arbitrary code on affected systems.