First published: Tue Oct 29 2024(Updated: )
A maliciously crafted DWG file, when parsed through Autodesk AutoCAD and certain AutoCAD-based products, can force a Stack-based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
AutoCAD | >=2025<2025.1.1 | |
Autodesk AutoCAD Advance Steel | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk Civil 3D | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD LT | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk DWG TrueView | >=2025<2025.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7992 is classified as a high-severity vulnerability due to its potential for stack-based buffer overflow and remote code execution.
To fix CVE-2024-7992, users should update their Autodesk AutoCAD products to versions beyond 2025.1.1 as per the vendor's security advisory.
CVE-2024-7992 affects various Autodesk products including AutoCAD, AutoCAD Electrical, and Autodesk DWG TrueView from versions 2025 and below.
If you receive a malicious DWG file, do not open it and ensure your AutoCAD software is updated to mitigate the risk from CVE-2024-7992.
Yes, CVE-2024-7992 can be exploited to read sensitive data, which may lead to data breaches depending on the nature of the data handled by the affected software.