CVE-2024-23154

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to exploit a heap-based buffer overflow in Autodesk applications when processing malicious SLDPRT files. Attackers can crash applications, read sensitive data, or execute arbitrary code with the privileges of the current user. Users of affected Autodesk software are vulnerable when opening untrusted SLDPRT files.

💻 Affected Systems

Products:
  • Autodesk applications using ODXSW_DLL.dll
Versions: Specific versions not detailed in provided references; check Autodesk advisory for exact affected versions.
Operating Systems: Windows, macOS, Linux (if Autodesk software supports)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing SLDPRT files through the affected DLL. All configurations using vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the current user, potentially leading to full system compromise.

🟠

Likely Case

Application crashes and potential information disclosure when users open malicious SLDPRT files.

🟢

If Mitigated

Limited impact if users only open trusted files and applications run with minimal privileges.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but could be delivered via email or web downloads.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious files shared via internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious files. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Autodesk advisory ADSK-SA-2024-0010 for specific patched versions

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010

Restart Required: Yes

Instructions:

1. Visit the Autodesk security advisory. 2. Identify affected products and versions. 3. Update to the latest patched version through Autodesk's update mechanism or download from official sources. 4. Restart the application and system if required.

🔧 Temporary Workarounds

Restrict SLDPRT file handling

all

Configure applications to not automatically open SLDPRT files or use application whitelisting to block untrusted files.

Run with reduced privileges

windows

Run Autodesk applications with limited user privileges to reduce impact of potential code execution.

🧯 If You Can't Patch

  • Implement strict file handling policies: only open SLDPRT files from trusted sources.
  • Use application control solutions to restrict execution of Autodesk applications or block processing of SLDPRT files.

🔍 How to Verify

Check if Vulnerable:

Check your Autodesk software version against the affected versions listed in Autodesk advisory ADSK-SA-2024-0010.

Check Version:

Within Autodesk application: Help → About or check through Autodesk Desktop App.

Verify Fix Applied:

Verify that your Autodesk software has been updated to a version not listed as vulnerable in the advisory.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening SLDPRT files
  • Unexpected process termination of Autodesk applications

Network Indicators:

  • Downloads of SLDPRT files from untrusted sources
  • Unusual outbound connections from Autodesk processes

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName contains 'Autodesk' AND ExceptionCode='0xc0000005'

🔗 References

📤 Share & Export