CVE-2024-37008

7.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Autodesk Revit allows arbitrary code execution when processing malicious DWG files. Attackers can exploit this to run code with the same privileges as the Revit process. Users who open untrusted DWG files in affected Revit versions are at risk.

💻 Affected Systems

Products:
  • Autodesk Revit
Versions: 2024 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Revit when opening DWG files. Other Autodesk products may have similar vulnerabilities but are not confirmed for this specific CVE.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary code execution, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive design files and system resources controlled by the Revit process.

🟢

If Mitigated

Limited impact with proper file handling controls and user awareness, potentially causing application crashes but no code execution.

🌐 Internet-Facing: LOW - Exploitation requires user interaction to open malicious files, not directly exposed via network services.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious files via email or file shares, leading to lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious DWG file. No public exploit code is available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version per Autodesk advisory

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0013

Restart Required: Yes

Instructions:

1. Open Autodesk Desktop App or Autodesk Account. 2. Check for available updates for Revit. 3. Download and install the latest security update. 4. Restart Revit and any related services.

🔧 Temporary Workarounds

Restrict DWG file handling

windows

Configure Revit to not automatically open DWG files or use alternative viewers for untrusted files

User awareness training

all

Train users to only open DWG files from trusted sources and verify file integrity

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use network segmentation to isolate Revit workstations from critical systems

🔍 How to Verify

Check if Vulnerable:

Check Revit version against affected versions in Autodesk advisory. If using Revit 2024 or earlier and opening DWG files, assume vulnerable.

Check Version:

In Revit: Help > About Autodesk Revit > Build Number

Verify Fix Applied:

Verify Revit version is updated to latest release and test opening known safe DWG files to confirm functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in Revit with stack overflow errors
  • Unexpected child processes spawned from Revit.exe

Network Indicators:

  • Unusual outbound connections from Revit workstations
  • DNS requests to suspicious domains from Revit processes

SIEM Query:

Process Creation where Parent Process Name contains 'Revit.exe' AND Command Line contains unusual parameters

🔗 References

📤 Share & Export