CVE-2023-25004

7.8 HIGH

📋 TL;DR

This vulnerability in Autodesk products allows attackers to execute arbitrary code by exploiting integer overflow in pskernel.dll. Users running affected Autodesk software are at risk of complete system compromise if they open malicious files.

💻 Affected Systems

Products:
  • Autodesk products using pskernel.dll
Versions: Multiple versions prior to April 2023 updates
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Specific affected products include AutoCAD, Revit, and other Autodesk applications that use the vulnerable DLL. Check vendor advisory for complete list.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or remote code execution when users open specially crafted files, leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact with proper application sandboxing and file execution restrictions, potentially only crashing the application.

🌐 Internet-Facing: MEDIUM - While primarily requiring user interaction with malicious files, web-based file sharing or collaboration features could facilitate exploitation.
🏢 Internal Only: HIGH - Internal users opening malicious files (via email, shared drives, etc.) could lead to widespread compromise within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious files. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: April 2023 security updates

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0009

Restart Required: Yes

Instructions:

1. Open affected Autodesk product. 2. Navigate to Help > Check for Updates. 3. Install April 2023 security updates. 4. Restart the application and system as prompted.

🔧 Temporary Workarounds

Restrict DLL loading

windows

Apply DLL loading restrictions to prevent malicious pskernel.dll files from being loaded

reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\<autodesk_exe>" /v "MitigationOptions" /t REG_DWORD /d 0x2 /f

Application control policies

windows

Implement application whitelisting to prevent unauthorized DLL execution

🧯 If You Can't Patch

  • Implement strict file execution policies to prevent opening untrusted files
  • Use application sandboxing or virtualization for Autodesk products

🔍 How to Verify

Check if Vulnerable:

Check pskernel.dll version in Autodesk installation directory. Vulnerable versions are prior to April 2023 updates.

Check Version:

powershell "Get-Item 'C:\Program Files\Autodesk\*\pskernel.dll' | Select-Object VersionInfo"

Verify Fix Applied:

Verify pskernel.dll file version has been updated to April 2023 or later version in Autodesk installation directory.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in Autodesk products
  • Unusual DLL loading events
  • Process creation from Autodesk executables

Network Indicators:

  • Outbound connections from Autodesk processes to unknown IPs
  • DNS requests for suspicious domains from Autodesk processes

SIEM Query:

source="windows" AND (process_name="*autodesk*" OR process_name="*acad*") AND (event_id=1000 OR event_id=1001) AND message="*exception*"

🔗 References

📤 Share & Export