First published: Tue Oct 29 2024(Updated: )
A maliciously crafted CATPART file when parsed in CC5Dll.dll through Autodesk AutoCAD can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
AutoCAD | >=2025<2025.1.1 | |
Autodesk AutoCAD Advance Steel | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk Civil 3D | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9827 is classified as an Out-of-Bounds Read vulnerability, which can lead to crashes or unauthorized code execution.
To fix CVE-2024-9827, update Autodesk AutoCAD and its related products to version 2025.1.2 or higher as per the vendor's guidelines.
CVE-2024-9827 affects Autodesk AutoCAD versions 2025 and earlier, including specific products like Advance Steel, Civil 3D, and others.
An attacker can exploit CVE-2024-9827 by crafting a malicious CATPART file that triggers the Out-of-Bounds Read when parsed in affected Autodesk software.
The risks associated with CVE-2024-9827 include potential crashes, sensitive data exposure, and the ability to execute arbitrary code in the software context.