First published: Tue Oct 29 2024(Updated: )
A maliciously crafted STP file when parsed in ASMDATAX230A.dll through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
AutoCAD | >=2025<2025.1.1 | |
Autodesk AutoCAD Advance Steel | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk Civil 3D | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8597 is classified as a critical vulnerability due to the potential for memory corruption and remote code execution.
To fix CVE-2024-8597, apply the latest security patch provided by Autodesk for your affected product version.
CVE-2024-8597 affects multiple Autodesk products including AutoCAD versions 2025 and earlier, except for newer 2025.1.1 versions.
If vulnerable to CVE-2024-8597, an attacker could exploit the vulnerability to crash the application, write sensitive data, or execute arbitrary code.
Currently, the recommended approach for CVE-2024-8597 is to update the software to the latest version as no effective workaround is documented.