Skip to main content

CVE-2024-9997: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk AutoCAD

High
VulnerabilityCVE-2024-9997cvecve-2024-9997cwe-120
Published: Tue Oct 29 2024 (10/29/2024, 21:45:59 UTC)
Source: CVE
Vendor/Project: Autodesk
Product: AutoCAD

Description

A maliciously crafted DWG file when parsed in acdb25.dll through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 07/06/2025, 16:56:31 UTC

Technical Analysis

CVE-2024-9997 is a high-severity buffer overflow vulnerability identified in Autodesk AutoCAD versions 2022 through 2025. The vulnerability resides in the acdb25.dll component responsible for parsing DWG files, the native file format for AutoCAD drawings. Specifically, the flaw is a classic buffer overflow (CWE-120) caused by improper handling of input size during a buffer copy operation. When a specially crafted malicious DWG file is loaded, the vulnerable function fails to validate the size of the input data before copying it into a fixed-size buffer, leading to memory corruption. This corruption can manifest as a program crash, unauthorized disclosure of sensitive data, or arbitrary code execution within the context of the AutoCAD process. Exploitation requires a user to open or preview the malicious DWG file, as indicated by the CVSS vector (User Interaction required). No privileges are required to trigger the vulnerability, and the attack vector is local (AV:L), meaning the attacker must have access to the system or file. The vulnerability affects confidentiality, integrity, and availability, with potential for full system compromise if exploited successfully. As of the publication date, no known exploits have been observed in the wild, and no patches have been released yet by Autodesk. The vulnerability was reserved on 2024-10-15 and published on 2024-10-29, indicating a recent discovery and disclosure. Given AutoCAD's widespread use in engineering, architecture, and design sectors, this vulnerability poses a significant risk to organizations relying on this software for critical operations.

Potential Impact

For European organizations, the impact of CVE-2024-9997 could be substantial, particularly in industries such as construction, manufacturing, automotive, aerospace, and infrastructure development where AutoCAD is extensively used. Successful exploitation could lead to unauthorized execution of code, potentially allowing attackers to deploy malware, steal intellectual property, or disrupt business operations by causing application crashes or system instability. The confidentiality of sensitive design documents and proprietary information could be compromised, leading to competitive disadvantage or regulatory compliance issues under GDPR if personal data is involved. The integrity of design files could be undermined, resulting in flawed engineering outputs or safety risks. Availability impacts could disrupt project timelines and cause financial losses. Since exploitation requires user interaction (opening a malicious DWG file), phishing or social engineering campaigns targeting employees in design and engineering roles could be a likely attack vector. The lack of patches at the time of disclosure increases the urgency for organizations to implement mitigations. The vulnerability's local attack vector suggests that attackers may need initial access to the victim's environment, possibly via compromised email attachments, shared drives, or insider threats. Given the high CVSS score (7.8) and the potential for arbitrary code execution, European organizations must prioritize addressing this vulnerability to prevent potential breaches and operational disruptions.

Mitigation Recommendations

1. Immediate mitigation should include user awareness training to avoid opening DWG files from untrusted or unknown sources, especially those received via email or external file shares. 2. Implement strict access controls and network segmentation to limit exposure of systems running AutoCAD, reducing the risk of lateral movement by attackers. 3. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to AutoCAD processes, such as unexpected crashes or code injection attempts. 4. Use application whitelisting to restrict execution of unauthorized binaries and scripts that could be leveraged post-exploitation. 5. Regularly back up critical design files and maintain version control to recover from potential data corruption or ransomware attacks. 6. Monitor Autodesk’s official channels for patch releases and apply updates promptly once available. 7. Consider sandboxing or opening DWG files in isolated environments or virtual machines to contain potential exploitation attempts. 8. Review and tighten email filtering rules to detect and block suspicious attachments or links that could deliver malicious DWG files. 9. Conduct vulnerability scanning and penetration testing focused on AutoCAD deployments to identify and remediate exposure. 10. Coordinate with IT and security teams to develop incident response plans specific to AutoCAD-related threats.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
autodesk
Date Reserved
2024-10-15T13:39:39.800Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecb49

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 7/6/2025, 4:56:31 PM

Last updated: 7/30/2025, 10:14:30 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats