First published: Tue Oct 29 2024(Updated: )
A maliciously crafted CATPART file when parsed in AcTranslators.exe through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
AutoCAD | >=2024<2024.1.6 | |
Autodesk AutoCAD Advance Steel | >=2024<2024.1.6 | |
AutoCAD | >=2024<2024.1.6 | |
Autodesk Civil 3D | >=2024<2024.1.6 | |
AutoCAD | >=2024<2024.1.6 | |
AutoCAD | >=2024<2024.1.6 | |
AutoCAD | >=2024<2024.1.6 | |
AutoCAD | >=2024<2024.1.6 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8592 is classified as a critical severity vulnerability due to its potential for memory corruption leading to arbitrary code execution.
To fix CVE-2024-8592, users should update Autodesk AutoCAD to the latest version released after the vulnerability was disclosed.
CVE-2024-8592 can be exploited by attackers through a maliciously crafted CATPART file, causing application crashes and potentially allowing remote code execution.
CVE-2024-8592 affects multiple versions of Autodesk AutoCAD and its derivatives, including AutoCAD Architecture, Civil 3D, and Advance Steel, among others.
Exploitation of CVE-2024-8592 can lead to application crashes, writing of sensitive information, or execution of arbitrary commands in the context of the application.