Skip to main content

CVE-2024-7992: CWE-121 Stack Overflow in Autodesk AutoCAD

High
VulnerabilityCVE-2024-7992cvecve-2024-7992cwe-121
Published: Tue Oct 29 2024 (10/29/2024, 21:50:13 UTC)
Source: CVE
Vendor/Project: Autodesk
Product: AutoCAD

Description

A maliciously crafted DWG file, when parsed through Autodesk AutoCAD and certain AutoCAD-based products, can force a Stack-based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 07/06/2025, 16:55:15 UTC

Technical Analysis

CVE-2024-7992 is a high-severity stack-based buffer overflow vulnerability (CWE-121) affecting Autodesk AutoCAD versions 2022 through 2025. The vulnerability arises when AutoCAD or certain AutoCAD-based products parse a specially crafted DWG file. Due to improper bounds checking during the parsing process, an attacker can cause a stack overflow, which may lead to a program crash, unauthorized disclosure of sensitive information, or arbitrary code execution within the context of the AutoCAD process. Exploitation requires the victim to open or process a malicious DWG file, which implies user interaction is necessary. The CVSS v3.1 score of 7.8 reflects a high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required, but user interaction is needed. Although no known exploits are currently reported in the wild, the vulnerability's nature and the widespread use of AutoCAD in engineering, architecture, and design make it a significant risk. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations and monitoring.

Potential Impact

For European organizations, this vulnerability poses a critical risk particularly to sectors heavily reliant on AutoCAD for design and engineering workflows, such as manufacturing, construction, automotive, aerospace, and infrastructure development. Successful exploitation could lead to unauthorized access to proprietary design data, intellectual property theft, disruption of critical design processes, and potential deployment of malware or ransomware through arbitrary code execution. The confidentiality breach could expose sensitive project details or client information, while integrity compromise could result in corrupted design files, causing downstream operational failures or safety issues. Availability impacts could halt design operations, leading to project delays and financial losses. Given the prevalence of AutoCAD in European industries and the interconnected nature of supply chains, the vulnerability could have cascading effects beyond the initially compromised organization.

Mitigation Recommendations

1. Immediately restrict the handling of DWG files from untrusted or unknown sources, implementing strict file validation and sandboxing where possible. 2. Employ network segmentation and application whitelisting to limit AutoCAD's ability to communicate externally or execute unauthorized code. 3. Monitor AutoCAD processes for anomalous behavior indicative of exploitation attempts, such as unexpected crashes or unusual memory usage. 4. Educate users on the risks of opening DWG files from unverified sources and enforce policies for secure file sharing. 5. Coordinate with Autodesk for timely patch deployment once available; meanwhile, consider using alternative software or versions not affected if feasible. 6. Implement endpoint detection and response (EDR) solutions capable of detecting exploitation patterns related to stack overflows and code execution. 7. Regularly back up critical design files and maintain version control to enable recovery in case of file corruption or ransomware attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
autodesk
Date Reserved
2024-08-19T21:37:08.684Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecb36

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 7/6/2025, 4:55:15 PM

Last updated: 8/12/2025, 4:01:11 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats