A maliciously crafted STP file, when parsed in ASMIMPORT228A.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Metrics
Affected Vendors & Products
References
History
Fri, 11 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Autodesk advance Steel
Autodesk autocad Architecture Autodesk autocad Electrical Autodesk autocad Map 3d Autodesk autocad Mechanical Autodesk autocad Mep Autodesk autocad Plant 3d Autodesk civil 3d |
|
CPEs | cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Autodesk advance Steel
Autodesk autocad Architecture Autodesk autocad Electrical Autodesk autocad Map 3d Autodesk autocad Mechanical Autodesk autocad Mep Autodesk autocad Plant 3d Autodesk civil 3d |
Mon, 10 Feb 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A maliciously crafted STP file when parsed in ASMIMPORT228A.dll through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. | A maliciously crafted STP file, when parsed in ASMIMPORT228A.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. |
Fri, 17 Jan 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Autodesk
Autodesk autocad Autodesk autocad Advance Steel Autodesk autocad Civil 3d |
|
CPEs | cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad:2025:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_advance_steel:2024:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_advance_steel:2025:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_civil_3d:2024:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_civil_3d:2025:*:*:*:*:*:*:* |
|
Vendors & Products |
Autodesk
Autodesk autocad Autodesk autocad Advance Steel Autodesk autocad Civil 3d |
|
Metrics |
ssvc
|
Fri, 17 Jan 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A maliciously crafted STP file in ASMIMPORT228A.dll when parsed through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process. | A maliciously crafted STP file when parsed in ASMIMPORT228A.dll through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. |
Title | Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software | |
Metrics |
cvssV3_1
|
cvssV3_1
|

Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2025-02-10T21:10:20.225Z
Reserved: 2024-01-11T21:46:45.746Z
Link: CVE-2024-23124

Updated: 2024-08-01T22:59:30.697Z

Status : Analyzed
Published: 2024-02-22T03:15:08.027
Modified: 2025-04-11T15:57:18.310
Link: CVE-2024-23124

No data.