CVE-2024-37008
EUVD-2024-3663121.08.2024, 10:15
A maliciously crafted DWG file, when parsed in Revit, can force a stack-based buffer overflow. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.Enginsight
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
| Vendor | Product | Version | Source |
|---|---|---|---|
| autodesk | revit_lt | 2025 ≤ 𝑥 < 2025.1 | ADP |
| autodesk | revit_lt | 2024 ≤ 𝑥 ≤ 2024.2.1 | ADP |
| autodesk | revit_lt | 2023 ≤ 𝑥 ≤ 2023.1.4 | ADP |
| autodesk | revit_lt | 2022 ≤ 𝑥 ≤ 2022.1.6 | ADP |
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.