CVE-2024-11454

7.8 HIGH

📋 TL;DR

This DLL hijacking vulnerability in Autodesk Revit allows attackers to execute arbitrary code by placing a malicious DLL in the same directory as an RVT file. When Revit loads the RVT file, it may load the malicious DLL instead of legitimate libraries due to an untrusted search path. This affects all Revit users who open RVT files from untrusted sources or directories.

💻 Affected Systems

Products:
  • Autodesk Revit
Versions: Multiple versions up to and including 2025.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Vulnerability requires user interaction to open an RVT file from a directory containing malicious DLLs.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Revit user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware execution when users open RVT files from untrusted locations like email attachments or downloaded files.

🟢

If Mitigated

Limited impact if users only open RVT files from trusted, controlled directories and have proper endpoint security.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening an RVT file) and placing malicious DLL in the same directory. No authentication bypass needed beyond tricking user to open file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.1.1 and later

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0025

Restart Required: Yes

Instructions:

1. Open Autodesk Desktop App or Autodesk Account. 2. Check for updates. 3. Install Revit 2025.1.1 or later. 4. Restart Revit after installation.

🔧 Temporary Workarounds

Restrict DLL loading from current directory

windows

Set CWDIllegalInDllSearch registry key to prevent DLL loading from current directory

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v CWDIllegalInDllSearch /t REG_DWORD /d 0xFFFFFFFF /f

Use SafeDllSearchMode

windows

Enable Safe DLL search mode to prioritize system directories

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Only open RVT files from trusted, controlled directories
  • Implement application whitelisting to prevent unauthorized DLL execution

🔍 How to Verify

Check if Vulnerable:

Check Revit version - if earlier than 2025.1.1, system is vulnerable

Check Version:

In Revit: Help > About Autodesk Revit

Verify Fix Applied:

Verify Revit version is 2025.1.1 or later in Help > About Autodesk Revit

📡 Detection & Monitoring

Log Indicators:

  • Revit loading DLLs from non-system directories
  • Process creation events from Revit with unusual parent/child relationships

Network Indicators:

  • Unexpected outbound connections from Revit process

SIEM Query:

Process Creation where Image contains "revit.exe" and CommandLine contains ".dll" and not (CommandLine contains "C:\Windows" or CommandLine contains "C:\Program Files")

🔗 References

📤 Share & Export