Lucene search

K
cve[email protected]CVE-2023-25004
HistoryJun 27, 2023 - 7:15 p.m.

CVE-2023-25004

2023-06-2719:15:09
CWE-190
web.nvd.nist.gov
19
cve-2023-25004
pskernel.dll
autodesk
integer overflow
code execution
nvd

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

23.4%

A maliciously crafted pskernel.dll file in Autodesk products is used to trigger integer overflow vulnerabilities. Exploitation of these vulnerabilities may lead to code execution.

Affected configurations

NVD
Node
autodeskaliasRange20232023.1.1
OR
autodeskautocadRange20202020.1.6
OR
autodeskautocadRange20212021.1.3
OR
autodeskautocadRange20222022.1.3
OR
autodeskautocadRange20232023.1.1
OR
autodeskautocad_advance_steelRange20202020.1.6
OR
autodeskautocad_advance_steelRange20212021.1.3
OR
autodeskautocad_advance_steelRange20222022.1.3
OR
autodeskautocad_advance_steelRange20232023.1.1
OR
autodeskautocad_architectureRange20202020.1.6
OR
autodeskautocad_architectureRange20212021.1.3
OR
autodeskautocad_architectureRange20222022.1.3
OR
autodeskautocad_architectureRange20232023.1.1
OR
autodeskautocad_civil_3dRange20202020.1.6
OR
autodeskautocad_civil_3dRange20212021.1.3
OR
autodeskautocad_civil_3dRange20222022.1.3
OR
autodeskautocad_civil_3dRange20232023.1.1
OR
autodeskautocad_electricalRange20202020.1.6
OR
autodeskautocad_electricalRange20212021.1.3
OR
autodeskautocad_electricalRange20222022.1.3
OR
autodeskautocad_electricalRange20232023.1.1
OR
autodeskautocad_ltRange20202020.1.6
OR
autodeskautocad_ltRange20212021.1.3
OR
autodeskautocad_ltRange20222022.1.3
OR
autodeskautocad_ltRange20232023.1.1
OR
autodeskautocad_map_3dRange20202020.1.6
OR
autodeskautocad_map_3dRange20212021.1.3
OR
autodeskautocad_map_3dRange20222022.1.3
OR
autodeskautocad_map_3dRange20232023.1.1
OR
autodeskautocad_mechanicalRange20202020.1.6
OR
autodeskautocad_mechanicalRange20212021.1.3
OR
autodeskautocad_mechanicalRange20222022.1.3
OR
autodeskautocad_mechanicalRange20232023.1.1
OR
autodeskautocad_mepRange20202020.1.6
OR
autodeskautocad_mepRange20212021.1.3
OR
autodeskautocad_mepRange20222022.1.3
OR
autodeskautocad_mepRange20232023.1.1
OR
autodeskautocad_plant_3dRange20202020.1.6
OR
autodeskautocad_plant_3dRange20212021.1.3
OR
autodeskautocad_plant_3dRange20222022.1.3
OR
autodeskautocad_plant_3dRange20232023.1.1
OR
autodeskinfraworksRange20212021.2
OR
autodeskinfraworksRange20222022.1
OR
autodeskinfraworksRange20232023.1
OR
autodeskinventorRange20212021.5
OR
autodeskinventorRange20222022.4
OR
autodeskinventorRange20232023.3.1
OR
autodeskmaya_usdRange20222022.5
OR
autodeskmaya_usdRange20232023.3
OR
autodesknavisworksRange20222022.4
OR
autodesknavisworksRange20232023.2
OR
autodeskrevitRange20212021.1.8
OR
autodeskvredRange20232023.4

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Autodesk products",
    "versions": [
      {
        "version": "2023, 2022, 2021, 2020",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

23.4%

Related for CVE-2023-25004