First published: Tue Oct 29 2024(Updated: )
A maliciously crafted CATPART file, when parsed in ASMKERN230A.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
AutoCAD | >=2025<2025.1.1 | |
Autodesk AutoCAD Advance Steel | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk Civil 3D | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8593 is classified as a high-severity vulnerability due to its potential for Out-of-Bounds Write which can lead to arbitrary code execution.
To fix CVE-2024-8593, users should update Autodesk AutoCAD to the latest version beyond 2025.1.1.
The CVE-2024-8593 vulnerability is caused by a maliciously crafted CATPART file being parsed in ASMKERN230A.dll.
CVE-2024-8593 affects several Autodesk products including AutoCAD, AutoCAD Civil 3D, AutoCAD Mechanical, and AutoCAD MEP, specifically versions up to 2025.1.1.
Yes, CVE-2024-8593 can potentially allow a malicious actor to write sensitive data or cause a crash, leading to data loss.