First published: Tue Oct 29 2024(Updated: )
A maliciously crafted DWG file, when parsed in acdb25.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
AutoCAD | >=2025<2025.1.1 | |
Autodesk AutoCAD Advance Steel | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk Civil 3D | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD LT | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
AutoCAD | >=2025<2025.1.1 | |
Autodesk DWG TrueView | >=2025<2025.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9996 is classified as a high-severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2024-9996, users should update their Autodesk AutoCAD and related software to the latest patched version provided by Autodesk.
CVE-2024-9996 affects Autodesk AutoCAD and its various versions, specifically from 2025 to 2025.1.1.
CVE-2024-9996 can enable attacks that cause application crashes, unauthorized data writing, or arbitrary code execution.
As of now, the recommended approach for CVE-2024-9996 is to apply the available software updates rather than relying on workarounds.