First published: Tue Oct 29 2024(Updated: )
A maliciously crafted DWG file, when parsed through Autodesk AutoCAD and certain AutoCAD-based products, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk AutoCAD 2024 | >=2025<2025.1.1 | |
Autodesk AutoCAD Advance Steel | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk Civil 3D | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk AutoCAD LT 2017 | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk DWG TrueView 2022 | >=2025<2025.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7991 is categorized with a high severity due to its potential for allowing an attacker to execute arbitrary code.
To fix CVE-2024-7991, apply the latest security updates provided by Autodesk for affected versions of AutoCAD.
CVE-2024-7991 affects Autodesk AutoCAD and its related products from version 2025 to version 2025.1.1.
Exploiting CVE-2024-7991 can lead to application crashes, unauthorized access to sensitive data, and execution of arbitrary code.
Users of Autodesk AutoCAD and related applications who open maliciously crafted DWG files are specifically impacted by CVE-2024-7991.