Vulnerability Description
A maliciously crafted PRT file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to cause an Out-Of-Bounds Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Autodesk | Autocad | < 2024.1 |
| Autodesk | Autocad Advance Steel | < 2023.1.4 |
| Autodesk | Autocad Architecture | < 2023.1.4 |
| Autodesk | Autocad Civil 3D | < 2023.1.4 |
| Autodesk | Autocad Electrical | < 2023.1.4 |
| Autodesk | Autocad Lt | < 2023.1.4 |
| Autodesk | Autocad Map 3D | < 2023.1.4 |
| Autodesk | Autocad Mechanical | < 2023.1.4 |
| Autodesk | Autocad Mep | < 2023.1.4 |
| Autodesk | Autocad Plant 3D | < 2023.1.4 |
Related Weaknesses (CWE)
References
- https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0018Vendor Advisory
- https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0018Vendor Advisory
FAQ
What is CVE-2023-29075?
CVE-2023-29075 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A maliciously crafted PRT file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to cause an Out-Of-Bounds Write. A malicious actor can leverage this vulnerability to cause a crash, read ...
How severe is CVE-2023-29075?
CVE-2023-29075 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-29075?
Check the references section above for vendor advisories and patch information. Affected products include: Autodesk Autocad, Autodesk Autocad Advance Steel, Autodesk Autocad Architecture, Autodesk Autocad Civil 3D, Autodesk Autocad Electrical.