CVE-2024-23152

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to exploit a buffer overflow in Autodesk's opennurbs.dll library when processing malicious 3DM files. Successful exploitation could lead to arbitrary code execution, data theft, or application crashes. Users of affected Autodesk applications are at risk.

💻 Affected Systems

Products:
  • Autodesk applications using opennurbs.dll
Versions: Multiple versions prior to the patched release
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations that process 3DM files through affected Autodesk applications are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the same privileges as the current user, potentially leading to full system compromise.

🟠

Likely Case

Application crash or denial of service, with potential for limited data exfiltration.

🟢

If Mitigated

Application crash with no data exposure if proper sandboxing and memory protections are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious file, but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Autodesk security advisory ADSK-SA-2024-0010 for specific patched versions

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010

Restart Required: Yes

Instructions:

1. Identify affected Autodesk applications
2. Check Autodesk security advisory ADSK-SA-2024-0010
3. Update to the latest patched version
4. Restart the application

🔧 Temporary Workarounds

Restrict 3DM file processing

all

Block or restrict processing of 3DM files from untrusted sources

Application sandboxing

all

Run Autodesk applications with reduced privileges or in sandboxed environments

🧯 If You Can't Patch

  • Implement strict file validation for 3DM files
  • Use application whitelisting to prevent unauthorized execution

🔍 How to Verify

Check if Vulnerable:

Check if opennurbs.dll version is prior to the patched release mentioned in Autodesk advisory

Check Version:

Check application About menu or use vendor-specific version checking tools

Verify Fix Applied:

Verify application version matches or exceeds the patched version in Autodesk advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing 3DM files
  • Memory access violation errors in application logs

Network Indicators:

  • Unusual file downloads of 3DM files
  • Network traffic from Autodesk applications to unexpected destinations

SIEM Query:

Search for application crash events related to Autodesk processes or memory access violations

🔗 References

📤 Share & Export