A maliciously crafted STP file in ASMKERN228A.dll when parsed through Autodesk applications can be used to dereference an untrusted pointer. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
References
| Link | Resource |
|---|---|
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 | Vendor Advisory |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 | Vendor Advisory |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 | Vendor Advisory |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
History
No history.
Information
Published : 2024-02-22 05:15
Updated : 2025-08-26 21:15
NVD link : CVE-2024-23136
Mitre link : CVE-2024-23136
CVE.ORG link : CVE-2024-23136
JSON object : View
Products Affected
autodesk
- autocad_electrical
- autocad_map_3d
- autocad
- autocad_mep
- autocad_mechanical
- autocad_plant_3d
- autocad_architecture
- advance_steel
- civil_3d
CWE
