Uninitialized Variable in Autodesk AutoCAD STP Parser Enables Code Execution
CVE-2024-23159 Published on June 25, 2024
Multiple ZDI Vulnerabilities in Autodesk AutoCAD and certain AutoCAD-based products
A maliciously crafted STP file, when parsed in stp_aim_x64_vc15d.dll through Autodesk applications, can be used to uninitialized variables. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process.
Vulnerability Analysis
CVE-2024-23159 can be exploited with local system access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Use of Uninitialized Variable
The code uses a variable that has not been initialized, leading to unpredictable or unintended results. In some languages such as C and C++, stack variables are not initialized by default. They generally contain junk data with the contents of stack memory before the function was invoked. An attacker can sometimes control or read these contents. In other languages or conditions, a variable that is not explicitly initialized can be given a default value that has security implications, depending on the logic of the program. The presence of an uninitialized variable can sometimes indicate a typographic error in the code.
Products Associated with CVE-2024-23159
Want to know whenever a new CVE is published for AutoDesk products? stack.watch will email you.
Affected Versions
Autodesk AutoCAD:- Version 2025 and below 2025.1 is affected.
- Version 2024 and below 2024.1.5 is affected.
- Version 2023 and below 2023.1.6 is affected.
- Version 2022 and below 2022.1.5 is affected.
- Version 2025 and below 2025.1 is affected.
- Version 2024 and below 2024.1.5 is affected.
- Version 2023 and below 2023.1.6 is affected.
- Version 2022 and below 2022.1.5 is affected.
- Version 2025 and below 2025.1 is affected.
- Version 2024 and below 2024.1.5 is affected.
- Version 2023 and below 2023.1.6 is affected.
- Version 2022 and below 2022.1.5 is affected.
- Version 2025 and below 2025.1 is affected.
- Version 2024 and below 2024.1.5 is affected.
- Version 2023 and below 2023.1.6 is affected.
- Version 2022 and below 2022.1.5 is affected.
- Version 2025 and below 2025.1 is affected.
- Version 2024 and below 2024.1.5 is affected.
- Version 2023 and below 2023.1.6 is affected.
- Version 2022 and below 2022.1.5 is affected.
- Version 2025 and below 2025.1 is affected.
- Version 2024 and below 2024.1.5 is affected.
- Version 2023 and below 2023.1.6 is affected.
- Version 2022 and below 2022.1.5 is affected.
- Version 2025 and below 2025.1 is affected.
- Version 2024 and below 2024.1.5 is affected.
- Version 2023 and below 2023.1.6 is affected.
- Version 2022 and below 2022.1.5 is affected.
- Version 2025 and below 2025.1 is affected.
- Version 2024 and below 2024.1.5 is affected.
- Version 2023 and below 2023.1.6 is affected.
- Version 2022 and below 2022.1.5 is affected.
- Version 2025 and below 2025.1 is affected.
- Version 2024 and below 2024.1.5 is affected.
- Version 2023 and below 2023.1.6 is affected.
- Version 2022 and below 2022.1.5 is affected.
- Version 2024 is affected.
- Version 2024 is affected.
- Version 2024 is affected.
- Version 2024 is affected.
- Version 2024 is affected.
- Version 2024 is affected.
- Version 2024 is affected.
- Version 2024 is affected.
- Version 2024 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.