Lucene search

K
cveAutodeskCVE-2024-37008
HistoryAug 21, 2024 - 10:15 a.m.

CVE-2024-37008

2024-08-2110:15:05
CWE-787
CWE-121
autodesk
web.nvd.nist.gov
28
dwg
buffer overflow
revit
arbitrary code
vulnerability

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

25.9%

A maliciously crafted DWG file, when parsed in Revit, can force a stack-based buffer overflow. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

Affected configurations

Nvd
Node
autodeskrevitMatch2022
OR
autodeskrevitMatch2023
OR
autodeskrevitMatch2024
OR
autodeskrevitMatch2025
VendorProductVersionCPE
autodeskrevit2022cpe:2.3:a:autodesk:revit:2022:*:*:*:*:*:*:*
autodeskrevit2023cpe:2.3:a:autodesk:revit:2023:*:*:*:*:*:*:*
autodeskrevit2024cpe:2.3:a:autodesk:revit:2024:*:*:*:*:*:*:*
autodeskrevit2025cpe:2.3:a:autodesk:revit:2025:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "Revit",
    "vendor": "Autodesk",
    "versions": [
      {
        "status": "affected",
        "version": "2025",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "2024.2.1",
        "status": "affected",
        "version": "2024",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "2023.1.4",
        "status": "affected",
        "version": "2023",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "2022.1.6",
        "status": "affected",
        "version": "2022",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "Revit LT",
    "vendor": "Autodesk",
    "versions": [
      {
        "status": "affected",
        "version": "2025",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "2024.2.1",
        "status": "affected",
        "version": "2024",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "2023.1.4",
        "status": "affected",
        "version": "2023",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "2022.1.6",
        "status": "affected",
        "version": "2022",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

25.9%

Related for CVE-2024-37008