Skip to main content

CVE-2024-7991: CWE-787 Out-of-Bounds Write in Autodesk AutoCAD

High
VulnerabilityCVE-2024-7991cvecve-2024-7991cwe-787
Published: Tue Oct 29 2024 (10/29/2024, 21:49:02 UTC)
Source: CVE
Vendor/Project: Autodesk
Product: AutoCAD

Description

A maliciously crafted DWG file, when parsed through Autodesk AutoCAD and certain AutoCAD-based products, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 07/06/2025, 16:55:03 UTC

Technical Analysis

CVE-2024-7991 is a high-severity vulnerability identified in Autodesk AutoCAD versions 2022 through 2025. This vulnerability is classified as a CWE-787 Out-of-Bounds Write, which occurs when a maliciously crafted DWG file is parsed by AutoCAD or certain AutoCAD-based products. The vulnerability arises due to improper handling of data within the DWG file format, allowing an attacker to write data outside the bounds of allocated memory buffers. Exploitation of this flaw can lead to several critical consequences: forced application crashes (denial of service), data corruption, or potentially arbitrary code execution within the context of the AutoCAD process. The CVSS 3.1 base score of 7.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the widespread use of AutoCAD in design, engineering, and architectural workflows. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring. The vulnerability is particularly dangerous because it can be triggered by opening or parsing a malicious DWG file, a common file format in AutoCAD, which may be received via email, file sharing, or other vectors involving user interaction.

Potential Impact

For European organizations, the impact of CVE-2024-7991 is substantial, especially for those in sectors heavily reliant on AutoCAD for design and engineering, such as manufacturing, construction, automotive, aerospace, and infrastructure development. Successful exploitation could lead to operational disruptions due to application crashes or data corruption, potentially delaying projects and causing financial losses. More critically, arbitrary code execution could allow attackers to escalate privileges, move laterally within networks, or exfiltrate sensitive intellectual property and design data, which are often highly valuable and confidential. This could result in significant reputational damage and regulatory consequences under GDPR if personal or sensitive data is compromised. The requirement for user interaction (opening a malicious DWG file) means that social engineering or phishing campaigns targeting employees are likely attack vectors. Given the integration of AutoCAD in many European industrial and governmental environments, the vulnerability could be leveraged in targeted attacks or espionage campaigns, especially against organizations involved in critical infrastructure or defense sectors.

Mitigation Recommendations

To mitigate the risks posed by CVE-2024-7991, European organizations should implement the following specific measures: 1) Immediately restrict the opening of DWG files from untrusted or unknown sources, employing strict file validation and sandboxing where possible. 2) Educate users about the risks of opening unsolicited DWG files and implement robust phishing awareness training tailored to engineering and design teams. 3) Deploy endpoint protection solutions capable of detecting anomalous behavior related to AutoCAD processes, such as unexpected memory writes or crashes. 4) Use application whitelisting and privilege restrictions to limit the ability of AutoCAD processes to execute arbitrary code or write outside designated directories. 5) Monitor network traffic for unusual file transfers or access patterns involving DWG files. 6) Coordinate with Autodesk for timely patch deployment once available and consider temporary compensating controls such as disabling AutoCAD features that parse external DWG files if feasible. 7) Implement strict access controls and network segmentation to contain potential breaches originating from compromised AutoCAD instances. 8) Maintain up-to-date backups of critical design files to enable recovery from data corruption or ransomware scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
autodesk
Date Reserved
2024-08-19T21:37:04.701Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecb34

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 7/6/2025, 4:55:03 PM

Last updated: 8/2/2025, 3:02:29 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats