First published: Tue Oct 29 2024(Updated: )
A maliciously crafted DWG file when parsed in ACAD.exe through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
AutoCAD | >=2025<2025.1.1 | |
Autodesk AutoCAD Advance Steel | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk Civil 3D | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD LT | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk DWG TrueView 2023 | >=2025<2025.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9489 is classified as a high severity vulnerability due to its potential for memory corruption and arbitrary code execution.
To fix CVE-2024-9489, users should update their affected Autodesk software versions to the latest patches provided by Autodesk.
CVE-2024-9489 affects Autodesk AutoCAD and its various variants, specifically versions from 2025 to 2025.1.1.
By exploiting CVE-2024-9489, an attacker can cause application crashes, write sensitive data, or execute arbitrary code in the context of the current process.
There are currently no documented workarounds for CVE-2024-9489; updating to the latest version is highly recommended.