First published: Tue Oct 29 2024(Updated: )
A maliciously crafted DXF file when parsed in acdb25.dll through Autodesk AutoCAD can force to access a variable prior to initialization. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
AutoCAD | >=2025<2025.1.1 | |
Autodesk AutoCAD Advance Steel | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk Civil 3D | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD LT | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk DWG TrueView | >=2025<2025.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8896 has a high severity due to its potential to allow arbitrary code execution and sensitive data exposure.
To fix CVE-2024-8896, ensure you update to the latest version of Autodesk AutoCAD or related software that addresses this vulnerability.
CVE-2024-8896 affects Autodesk AutoCAD and related software versions 2025.0 to 2025.1.1.
Yes, CVE-2024-8896 can be exploited remotely through the use of a malicious DXF file.
CVE-2024-8896 can cause crashes, write sensitive data, or execute arbitrary code in the context of the current user.