CVE-2024-37008
📋 TL;DR
A stack-based buffer overflow vulnerability in Autodesk Revit allows arbitrary code execution when processing malicious DWG files. Attackers can exploit this to run code with the same privileges as the Revit process. Users who open untrusted DWG files in affected Revit versions are at risk.
💻 Affected Systems
- Autodesk Revit
📦 What is this software?
Revit by Autodesk
Revit by Autodesk
Revit by Autodesk
Revit by Autodesk
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise through arbitrary code execution, potentially leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Local privilege escalation leading to unauthorized access to sensitive design files and system resources controlled by the Revit process.
If Mitigated
Limited impact with proper file handling controls and user awareness, potentially causing application crashes but no code execution.
🎯 Exploit Status
Exploitation requires user interaction to open a malicious DWG file. No public exploit code is available as of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to latest version per Autodesk advisory
Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0013
Restart Required: Yes
Instructions:
1. Open Autodesk Desktop App or Autodesk Account. 2. Check for available updates for Revit. 3. Download and install the latest security update. 4. Restart Revit and any related services.
🔧 Temporary Workarounds
Restrict DWG file handling
windowsConfigure Revit to not automatically open DWG files or use alternative viewers for untrusted files
User awareness training
allTrain users to only open DWG files from trusted sources and verify file integrity
🧯 If You Can't Patch
- Implement application whitelisting to prevent execution of unauthorized code
- Use network segmentation to isolate Revit workstations from critical systems
🔍 How to Verify
Check if Vulnerable:
Check Revit version against affected versions in Autodesk advisory. If using Revit 2024 or earlier and opening DWG files, assume vulnerable.
Check Version:
In Revit: Help > About Autodesk Revit > Build Number
Verify Fix Applied:
Verify Revit version is updated to latest release and test opening known safe DWG files to confirm functionality.
📡 Detection & Monitoring
Log Indicators:
- Application crashes in Revit with stack overflow errors
- Unexpected child processes spawned from Revit.exe
Network Indicators:
- Unusual outbound connections from Revit workstations
- DNS requests to suspicious domains from Revit processes
SIEM Query:
Process Creation where Parent Process Name contains 'Revit.exe' AND Command Line contains unusual parameters