CVE-2023-29069

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to place malicious DLL files in non-default locations, which can then be loaded by affected Autodesk software with elevated privileges. This leads to privilege escalation where attackers can execute arbitrary code with higher permissions. Users of affected Autodesk products on Windows systems are vulnerable.

💻 Affected Systems

Products:
  • Autodesk AutoCAD
  • Autodesk Civil 3D
  • Autodesk Advance Steel
  • Autodesk Architecture Engineering & Construction Collection
Versions: 2024 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system; affects Windows installations with default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing installation of persistent malware, data theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation enabling attackers to gain higher privileges than their current user account, potentially accessing sensitive files or installing additional malware.

🟢

If Mitigated

Limited impact with proper application whitelisting and least privilege principles in place, preventing unauthorized DLL loading.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to place malicious DLL files; exploitation is straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.1.2 and later updates

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0013

Restart Required: Yes

Instructions:

1. Open Autodesk Desktop App or access Autodesk Account. 2. Check for available updates. 3. Install the latest security update (2024.1.2 or later). 4. Restart the application and system as prompted.

🔧 Temporary Workarounds

Restrict DLL Loading

windows

Configure Windows to prevent loading of DLLs from untrusted locations using DLL search order hardening.

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager" -Name "CWDIllegalInDllSearch" -Value 0xFFFFFFFF

Application Whitelisting

windows

Implement application control policies to only allow execution of signed, trusted DLLs.

🧯 If You Can't Patch

  • Implement least privilege principles: Run Autodesk software with standard user accounts, not administrative privileges.
  • Monitor for suspicious DLL file creation in application directories and use endpoint detection to block unauthorized DLL loading.

🔍 How to Verify

Check if Vulnerable:

Check Autodesk product version: if using AutoCAD/Civil 3D/Advance Steel/AEC Collection 2024 or earlier without 2024.1.2 update, system is vulnerable.

Check Version:

In AutoCAD: Type "ABOUT" command or check Help > About. In Windows: Check Programs and Features for version details.

Verify Fix Applied:

Verify installed version is 2024.1.2 or later through Autodesk product About dialog or control panel.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Security ID 4688 for process creation with suspicious parent-child relationships, Sysmon Event ID 7 (Image loaded) for unexpected DLL loads from non-standard paths.

Network Indicators:

  • Unusual outbound connections from Autodesk processes to external IPs, especially following DLL load events.

SIEM Query:

source="windows" EventCode=4688 OR EventCode=7 | where ProcessName contains "acad.exe" OR ProcessName contains "civil3d.exe" | where ImageLoaded contains ".dll" | where ImageLoaded !contains "C:\Program Files\Autodesk"

🔗 References

📤 Share & Export