First published: Tue Oct 29 2024(Updated: )
A maliciously crafted 3DM file when parsed in atf_api.dll through Autodesk AutoCAD can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
AutoCAD | >=2025<2025.1.1 | |
Autodesk AutoCAD Advance Steel | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk Civil 3D | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9826 is classified as a potentially critical vulnerability due to its ability to cause crashes, write sensitive data, or execute arbitrary code.
To fix CVE-2024-9826, users should apply the latest patches and updates provided by Autodesk for affected versions of AutoCAD.
CVE-2024-9826 affects multiple versions of Autodesk AutoCAD including version 2025 and prior up to 2025.1.1.
A malicious actor can leverage CVE-2024-9826 to create a crash, access sensitive information, or execute code within the context of the running process.
If you are using Autodesk AutoCAD versions between 2025 and 2025.1.1, your system is vulnerable to CVE-2024-9826, and immediate action is advised.