Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23148: CWE-787 Out-of-bounds Write in Autodesk AutoCAD

0
High
VulnerabilityCVE-2024-23148cvecve-2024-23148cwe-787
Published: Tue Jun 25 2024 (06/25/2024, 02:42:11 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: AutoCAD

Description

A maliciously crafted CATPRODUCT file, when parsed in CC5Dll.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.

AI-Powered Analysis

AILast updated: 01/22/2026, 19:10:52 UTC

Technical Analysis

CVE-2024-23148 is a memory corruption vulnerability classified under CWE-787 (Out-of-bounds Write) affecting Autodesk AutoCAD versions 2022, 2023, 2024, and 2025. The vulnerability is triggered when AutoCAD parses a specially crafted CATPRODUCT file via the CC5Dll.dll library. This parsing process improperly handles file data, resulting in a write access violation that corrupts memory outside the intended buffer boundaries. Such memory corruption can be leveraged by attackers to execute arbitrary code within the context of the AutoCAD process. The vulnerability does not require any privileges to exploit but does require user interaction, such as opening or importing the malicious CATPRODUCT file. While no public exploits have been reported yet, the vulnerability’s potential for code execution makes it a critical concern, especially when combined with other vulnerabilities that may facilitate privilege escalation or persistence. The CVSS 3.1 base score of 7.8 reflects high confidentiality, integrity, and availability impacts, with low attack complexity and no privileges required. The vulnerability is currently published but lacks an official patch, underscoring the need for vigilance and interim mitigations.

Potential Impact

For European organizations, this vulnerability presents a significant risk, particularly for industries heavily reliant on AutoCAD for CAD design, such as manufacturing, automotive, aerospace, and construction sectors. Successful exploitation could lead to unauthorized code execution, enabling attackers to steal intellectual property, disrupt design workflows, or deploy ransomware and other malware. The compromise of design files and engineering data could have downstream effects on product development and operational continuity. Given the widespread use of AutoCAD in Europe, especially in countries with large industrial bases, the impact could be substantial. Additionally, the vulnerability could be leveraged in targeted attacks against engineering firms or critical infrastructure projects, amplifying the potential damage. The requirement for user interaction means phishing or social engineering could be used to deliver the malicious CATPRODUCT files, increasing the attack surface. The absence of known exploits in the wild currently provides a window for proactive defense but should not lead to complacency.

Mitigation Recommendations

Until an official patch is released by Autodesk, European organizations should implement several targeted mitigations: 1) Enforce strict file validation and scanning policies for all CATPRODUCT files received from external or untrusted sources, using advanced endpoint detection and response (EDR) tools capable of detecting anomalous file behaviors. 2) Educate users, especially CAD operators and engineers, about the risks of opening files from unknown or suspicious origins and implement robust phishing awareness training. 3) Restrict AutoCAD’s ability to load external files through application whitelisting and sandboxing techniques to limit the impact of potential exploitation. 4) Monitor AutoCAD process behavior for unusual memory access patterns or crashes that could indicate exploitation attempts. 5) Employ network segmentation to isolate CAD workstations from critical infrastructure and sensitive data repositories. 6) Prepare for rapid deployment of patches once Autodesk releases updates by maintaining an up-to-date asset inventory and patch management process focused on AutoCAD installations. 7) Consider disabling or limiting the use of CATPRODUCT file imports if feasible within operational constraints.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2024-01-11T21:51:21.127Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697275ff4623b1157c86518d

Added to database: 1/22/2026, 7:09:51 PM

Last enriched: 1/22/2026, 7:10:52 PM

Last updated: 2/5/2026, 9:08:54 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats