Acdb25.dll NULL Deref in AutoCAD: Crash & Code Exec via Malicious DXF
CVE-2024-8896 Published on October 29, 2024
Autodesk AutoCAD DXF File Parsing Unitialized Variable Code Execution Vulnerability
A maliciously crafted DXF file when parsed in acdb25.dll through Autodesk AutoCAD can force to access a variable prior to initialization. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.
Vulnerability Analysis
CVE-2024-8896 is exploitable with local system access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Use of Uninitialized Resource
The software uses or accesses a resource that has not been initialized. When a resource has not been properly initialized, the software may behave unexpectedly. This may lead to a crash or invalid memory access, but the consequences vary depending on the type of resource and how it is used within the software.
Products Associated with CVE-2024-8896
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-8896 are published in these products:
Affected Versions
Autodesk AutoCAD:- Version 2025 and below 2025.1.1 is affected.
- Version 2024 and below 2024.1.7 is affected.
- Version 2023 and below 2023.1.7 is affected.
- Version 2022 and below 2022.1.6 is affected.
- Version 2025 and below 2025.1.1 is affected.
- Version 2024 and below 2024.1.7 is affected.
- Version 2023 and below 2023.1.7 is affected.
- Version 2022 and below 2022.1.6 is affected.
- Version 2025 and below 2025.1.1 is affected.
- Version 2024 and below 2024.1.7 is affected.
- Version 2023 and below 2023.1.7 is affected.
- Version 2022 and below 2022.1.6 is affected.
- Version 2025 and below 2025.1.1 is affected.
- Version 2024 and below 2024.1.7 is affected.
- Version 2023 and below 2023.1.7 is affected.
- Version 2022 and below 2022.1.6 is affected.
- Version 2025 and below 2025.1.1 is affected.
- Version 2024 and below 2024.1.7 is affected.
- Version 2023 and below 2023.1.7 is affected.
- Version 2022 and below 2022.1.6 is affected.
- Version 2025 and below 2025.1.1 is affected.
- Version 2024 and below 2024.1.7 is affected.
- Version 2023 and below 2023.1.7 is affected.
- Version 2022 and below 2022.1.6 is affected.
- Version 2025 and below 2025.1.1 is affected.
- Version 2024 and below 2024.1.7 is affected.
- Version 2023 and below 2023.1.7 is affected.
- Version 2022 and below 2022.1.6 is affected.
- Version 2025 and below 2025.1.1 is affected.
- Version 2024 and below 2024.1.7 is affected.
- Version 2023 and below 2023.1.7 is affected.
- Version 2022 and below 2022.1.6 is affected.
- Version 2025 and below 2025.1.1 is affected.
- Version 2024 and below 2024.1.7 is affected.
- Version 2023 and below 2023.1.7 is affected.
- Version 2022 and below 2022.1.6 is affected.
- Version 2025 and below 2025.1.1 is affected.
- Version 2024 and below 2024.1.7 is affected.
- Version 2023 and below 2023.1.7 is affected.
- Version 2022 and below 2022.1.6 is affected.
- Version 2025 and below 2025.1.1 is affected.
- Version 2024 and below 2024.1.7 is affected.
- Version 2023 and below 2023.1.7 is affected.
- Version 2025 and below 2025.1.1 is affected.
- Version 2024 and below 2024.1.7 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.