Show plain JSON{"dataType": "CVE_RECORD", "containers": {"adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2024-7995", "role": "CISA Coordinator", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2024-11-05T21:44:35.565911Z"}}}], "affected": [{"cpes": ["cpe:2.3:a:autodesk:vred:2025:*:*:*:*:*:*:*"], "vendor": "autodesk", "product": "vred", "versions": [{"status": "affected", "version": "2025"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-11-05T21:45:30.553Z"}}], "cna": {"title": "Autodesk VRED Design Privilege Escalation Vulnerability", "source": {"discovery": "UNKNOWN"}, "impacts": [{"capecId": "CAPEC-38", "descriptions": [{"lang": "en", "value": "CAPEC-38 Leveraging/Manipulating Configuration File Search Paths"}]}], "metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "affected": [{"vendor": "Autodesk", "product": "VRED Design", "versions": [{"status": "affected", "version": "2025"}], "defaultStatus": "unknown"}], "references": [{"url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0022"}], "x_generator": {"engine": "Vulnogram 0.2.0"}, "descriptions": [{"lang": "en", "value": "A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the VRED Design application. Exploitation of this vulnerability may lead to code execution.", "supportingMedia": [{"type": "text/html", "value": "<span style=\"background-color: rgb(255, 255, 255);\">A maliciously crafted </span><span style=\"background-color: rgb(255, 255, 255);\">binary</span><span style=\"background-color: rgb(255, 255, 255);\"> file when </span><span style=\"background-color: rgb(255, 255, 255);\">downloaded</span><span style=\"background-color: rgb(255, 255, 255);\"> could lead to </span><span style=\"background-color: rgb(255, 255, 255);\">escalation of privileges</span><span style=\"background-color: rgb(255, 255, 255);\"> to NT AUTHORITY/SYSTEM due to an untrusted search path being </span><span style=\"background-color: rgb(255, 255, 255);\">utilized</span><span style=\"background-color: rgb(255, 255, 255);\"> in the VRED Design application.</span><span style=\"background-color: rgb(255, 255, 255);\"> Exploitation of th</span><span style=\"background-color: rgb(255, 255, 255);\">is</span> <span style=\"background-color: rgb(255, 255, 255);\">vulnerabilit</span><span style=\"background-color: rgb(255, 255, 255);\">y</span><span style=\"background-color: rgb(255, 255, 255);\"> may lead to code execution.</span><br>", "base64": false}]}], "problemTypes": [{"descriptions": [{"lang": "en", "type": "CWE", "cweId": "CWE-426", "description": "CWE-426 Untrusted Search Path"}]}], "providerMetadata": {"orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk", "dateUpdated": "2024-11-05T20:06:43.521Z"}}}, "cveMetadata": {"cveId": "CVE-2024-7995", "state": "PUBLISHED", "dateUpdated": "2024-11-05T21:45:40.080Z", "dateReserved": "2024-08-19T21:37:11.389Z", "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "datePublished": "2024-11-05T20:06:43.521Z", "assignerShortName": "autodesk"}, "dataVersion": "5.1"}