A maliciously crafted STP or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can be used to uninitialized variables. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process.
References
| Link | Resource |
|---|---|
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 | Vendor Advisory |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 | Vendor Advisory |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009 | Vendor Advisory |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 | Vendor Advisory |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 | Vendor Advisory |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
History
No history.
Information
Published : 2024-02-22 05:15
Updated : 2025-04-11 15:55
NVD link : CVE-2024-23137
Mitre link : CVE-2024-23137
CVE.ORG link : CVE-2024-23137
JSON object : View
Products Affected
autodesk
- autocad_electrical
- autocad_map_3d
- autocad
- autocad_mep
- autocad_mechanical
- autocad_plant_3d
- autocad_architecture
- advance_steel
- civil_3d
