CVE-2024-23140

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to exploit out-of-bounds read conditions in Autodesk applications when processing malicious 3DM and MODEL files. Attackers could crash applications, read sensitive memory data, or potentially execute arbitrary code. Users of affected Autodesk software are at risk.

💻 Affected Systems

Products:
  • Autodesk applications using opennurbs.dll and atf_api.dll
Versions: Multiple versions prior to patches released in 2024
Operating Systems: Windows, macOS, Linux (where applicable)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of vulnerable Autodesk software. Specific product list available in vendor advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crashes causing denial of service and potential data corruption or limited information disclosure.

🟢

If Mitigated

Application crash with no data loss if proper file validation and sandboxing are implemented.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but could be delivered via email or downloads.
🏢 Internal Only: MEDIUM - Similar risk internally if users open untrusted files from network shares or email.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user to open malicious file. No public exploit code known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions specified in Autodesk Security Advisory ADSK-SA-2024-0009

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009

Restart Required: Yes

Instructions:

1. Identify affected Autodesk products. 2. Check Autodesk Account or product update mechanism. 3. Apply latest security updates. 4. Restart affected applications.

🔧 Temporary Workarounds

Restrict file types

all

Block or restrict 3DM and MODEL files from untrusted sources

Application sandboxing

all

Run Autodesk applications in restricted environments

🧯 If You Can't Patch

  • Implement strict file validation policies for 3DM/MODEL files
  • Use application whitelisting to prevent unauthorized Autodesk software execution

🔍 How to Verify

Check if Vulnerable:

Check Autodesk product version against advisory. Review if opennurbs.dll or atf_api.dll are present.

Check Version:

Check via Autodesk product 'About' dialog or Windows 'Programs and Features'

Verify Fix Applied:

Verify product version matches patched versions in advisory. Check file hashes of updated DLLs.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes from Autodesk software
  • Memory access violation errors
  • Unexpected file parsing errors

Network Indicators:

  • Downloads of 3DM/MODEL files from untrusted sources
  • Unusual outbound connections after file opens

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName contains 'Autodesk' AND ExceptionCode=c0000005

🔗 References

📤 Share & Export