
25/6/2024

28/1/2025
CVE-2024-23142: Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software
First published: Tue Jun 25 2024(Updated: )
A maliciously crafted CATPART, STP, and MODEL file, when parsed in atf_dwg_consumer.dll, rose_x64_vc15.dll and libodxdll through Autodesk applications, can cause a use-after-free vulnerability. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|
AutoCAD | | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-23142?
CVE-2024-23142 is considered a critical severity vulnerability due to its potential to allow code execution.
How does CVE-2024-23142 exploit Autodesk applications?
CVE-2024-23142 exploits Autodesk applications by using malicious CATPART, STP, and MODEL files that trigger a use-after-free condition.
What versions of Autodesk AutoCAD are affected by CVE-2024-23142?
CVE-2024-23142 affects all versions of Autodesk AutoCAD that utilize atf_dwg_consumer.dll, rose_x64_vc15.dll, and libodxdll.
What should I do if my system is vulnerable to CVE-2024-23142?
To mitigate CVE-2024-23142, ensure you update Autodesk AutoCAD to the latest version provided by the vendor.
Can CVE-2024-23142 allow for remote code execution?
Yes, CVE-2024-23142 can potentially lead to remote code execution if exploited by an attacker.
- agent/weakness
- agent/references
- agent/first-publish-date
- agent/type
- agent/description
- agent/author
- agent/source
- agent/title
- agent/event
- agent/softwarecombine
- collector/nvd-api
- source/NVD
- agent/severity
- agent/last-modified-date
- collector/mitre-cve
- source/MITRE
- agent/tags
- agent/guess-ai
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- vendor/autodesk
- canonical/autocad
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203