Revit Vulnerability Could Lead to Arbitrary Code Execution
CVE-2024-37008

7.8HIGH

Key Information:

Vendor
Autodesk
Vendor
CVE Published:
21 August 2024

Summary

A vulnerability in Autodesk Revit allows for a stack-based buffer overflow when processing specially crafted DWG files. This vulnerability can be exploited by a malicious actor to execute arbitrary code within the context of the affected application. It poses significant security risks, allowing attackers to manipulate the Revit environment and potentially gain unauthorized access to sensitive information or control over the system.

Affected Version(s)

Revit 2025 < 2025.1

Revit 2024 < 2024.2.2

Revit 2023 < 2023.1.5

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.