A maliciously crafted DLL file, when placed in the same directory as an RVT file could be loaded by Autodesk Revit, and execute arbitrary code in the context of the current process due to an untrusted search patch being utilized.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Dec 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Autodesk
Autodesk revit |
|
CPEs | cpe:2.3:a:autodesk:revit:2025:*:*:*:*:*:*:* | |
Vendors & Products |
Autodesk
Autodesk revit |
|
Metrics |
ssvc
|
Mon, 09 Dec 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A maliciously crafted DLL file, when placed in the same directory as an RVT file could be loaded by Autodesk Revit, and execute arbitrary code in the context of the current process due to an untrusted search patch being utilized. | |
Title | Untrusted Search Path vulnerability in Autodesk Revit | |
Weaknesses | CWE-426 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: autodesk
Published: 2024-12-09T17:48:30.983Z
Updated: 2024-12-09T18:07:39.304Z
Reserved: 2024-11-19T20:14:29.710Z
Link: CVE-2024-11454
Vulnrichment
Updated: 2024-12-09T18:07:31.165Z
NVD
Status : Received
Published: 2024-12-09T18:15:22.400
Modified: 2024-12-09T18:15:22.400
Link: CVE-2024-11454
Redhat
No data.