Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9500: CWE-379 Creation of Temporary File in Directory with Insecure Permissions in Autodesk Installer

0
High
VulnerabilityCVE-2024-9500cvecve-2024-9500cwe-379
Published: Fri Nov 15 2024 (11/15/2024, 21:24:22 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Installer

Description

A maliciously crafted DLL file when placed in temporary files and folders that are leveraged by the Autodesk Installer could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to insecure privilege management.

AI-Powered Analysis

AILast updated: 10/06/2025, 16:55:42 UTC

Technical Analysis

CVE-2024-9500 is a vulnerability classified under CWE-379, which concerns the creation of temporary files in directories with insecure permissions. Specifically, the Autodesk Installer version 2.10.0.17 improperly manages permissions on temporary files and folders it uses during installation or update processes. An attacker with local access can exploit this by placing a maliciously crafted DLL file into these temporary locations. Because the installer executes or loads files from these directories without sufficient privilege checks, the malicious DLL can be executed with NT AUTHORITY/SYSTEM privileges, effectively escalating the attacker's privileges from a limited user context to full system control. The CVSS 3.1 score of 7.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, given that it allows full system compromise. The attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable system. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk for environments where Autodesk Installer is used, especially on Windows systems. The lack of available patches at the time of publication necessitates immediate mitigation through configuration and monitoring.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Autodesk software in sectors such as engineering, architecture, construction, and manufacturing. Successful exploitation could allow attackers to gain SYSTEM-level privileges on affected machines, leading to potential full compromise of critical workstations or servers. This could result in unauthorized access to sensitive design files, intellectual property theft, disruption of business operations, and lateral movement within corporate networks. Given the high integrity and availability impact, organizations could face operational downtime and reputational damage. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where users may be tricked into running the installer or where insider threats exist. The vulnerability could also be leveraged as part of multi-stage attacks, increasing the overall threat landscape for European enterprises relying on Autodesk products.

Mitigation Recommendations

1. Immediately restrict permissions on temporary directories used by the Autodesk Installer to prevent unauthorized file creation or modification. 2. Implement application whitelisting and DLL integrity verification to detect and block unauthorized DLLs from loading during installation processes. 3. Educate users to avoid running untrusted installers or software updates without verification. 4. Monitor file system activity in temporary directories for suspicious DLL creation or modification events using endpoint detection and response (EDR) tools. 5. Isolate systems running Autodesk Installer from critical network segments to limit potential lateral movement. 6. Regularly audit installed software versions and configurations to identify vulnerable Autodesk Installer versions. 7. Apply vendor patches promptly once released; until then, consider using alternative installation methods or restricting installer usage. 8. Employ least privilege principles for user accounts to reduce the impact of local exploitation. 9. Use Windows security features such as Controlled Folder Access and Windows Defender Application Control to prevent unauthorized code execution. 10. Maintain up-to-date backups and incident response plans to recover quickly if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
autodesk
Date Reserved
2024-10-03T19:00:57.631Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e3f46f083a44572bc63cba

Added to database: 10/6/2025, 4:55:11 PM

Last enriched: 10/6/2025, 4:55:42 PM

Last updated: 10/7/2025, 12:01:19 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats