First published: Tue Jun 25 2024(Updated: )
A maliciously crafted CATPART, X_B and STEP, when parsed in ASMKERN228A.dll and ASMKERN229A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk AutoCAD 2024 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23147 has a critical severity rating due to its potential for remote code execution.
To mitigate CVE-2024-23147, ensure you update Autodesk AutoCAD to the latest version as recommended by the vendor.
CVE-2024-23147 specifically affects Autodesk AutoCAD 2024.
CVE-2024-23147 allows for memory corruption through a crafted CATPART, X_B, or STEP file, which may lead to code execution.
If you suspect you are affected by CVE-2024-23147, immediately update your software and follow best practices for cybersecurity.