Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12178: CWE-787 Out-of-bounds Write in Autodesk Navisworks Freedom

0
High
VulnerabilityCVE-2024-12178cvecve-2024-12178cwe-787
Published: Tue Dec 17 2024 (12/17/2024, 15:16:31 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Navisworks Freedom

Description

A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 01/22/2026, 19:10:18 UTC

Technical Analysis

CVE-2024-12178 is a vulnerability identified in Autodesk Navisworks Freedom 2025, a widely used software for project review in architecture, engineering, and construction. The flaw is an out-of-bounds write (CWE-787) triggered by parsing a maliciously crafted DWFX file, a file format used for sharing design data. This memory corruption can be exploited by an attacker to execute arbitrary code within the context of the Navisworks Freedom process. The vulnerability requires the victim to open a specially crafted DWFX file, implying user interaction is necessary. The CVSS v3.1 score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The impact covers confidentiality, integrity, and availability, as arbitrary code execution can lead to data theft, manipulation, or denial of service. No public exploits are known at this time, but the vulnerability is published and should be addressed promptly. The lack of a patch link suggests that a fix may still be pending or in development. Given the specialized nature of the software and its use in critical infrastructure projects, exploitation could have significant operational consequences.

Potential Impact

For European organizations, especially those in the architecture, engineering, and construction sectors, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized access to sensitive project data, manipulation of design files, or disruption of project workflows. This could result in intellectual property theft, financial losses, reputational damage, and delays in critical infrastructure projects. Since Navisworks Freedom is used for project review and collaboration, compromised systems could serve as entry points for broader network infiltration. The requirement for user interaction limits mass exploitation but targeted attacks against key personnel are plausible. The high confidentiality, integrity, and availability impact underscores the importance of timely mitigation. Additionally, the lack of known exploits currently provides a window for proactive defense.

Mitigation Recommendations

Organizations should implement strict controls on the handling of DWFX files, including restricting file sources to trusted partners and scanning files with advanced malware detection tools before opening. Until a vendor patch is released, consider sandboxing Navisworks Freedom or running it in isolated environments to limit the impact of potential exploitation. Employ application whitelisting to prevent unauthorized code execution and monitor for unusual process behavior indicative of exploitation attempts. User training should emphasize the risks of opening unsolicited or unexpected DWFX files. Network segmentation can help contain any compromise. Once Autodesk releases a patch, prioritize its deployment across all affected systems. Additionally, maintain up-to-date backups of critical project data to enable recovery in case of an incident.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2024-12-04T16:29:28.425Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697275ff4623b1157c865181

Added to database: 1/22/2026, 7:09:51 PM

Last enriched: 1/22/2026, 7:10:18 PM

Last updated: 2/7/2026, 8:33:10 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats