First published: Wed Aug 21 2024(Updated: )
A maliciously crafted DWG file, when parsed in Revit, can force a stack-based buffer overflow. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk Revit | =2022 | |
Autodesk Revit | =2023 | |
Autodesk Revit | =2024 | |
Autodesk Revit | =2025 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.