First published: Fri Nov 15 2024(Updated: )
A maliciously crafted DLL file when placed in temporary files and folders that are leveraged by the Autodesk Installer could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to insecure privilege management.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9500 is classified as a high severity vulnerability due to the potential for privilege escalation to NT AUTHORITY/SYSTEM.
To fix CVE-2024-9500, ensure that all Autodesk Installer components are updated to the latest version provided by Autodesk.
CVE-2024-9500 affects users of the Autodesk ADP Desktop SDK that utilize insecure privilege management in temporary files.
CVE-2024-9500 involves using a maliciously crafted DLL file to exploit privilege escalation vulnerabilities.
The consequences of CVE-2024-9500 include unauthorized escalation of privileges, potentially allowing an attacker to execute arbitrary code with elevated system permissions.