Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-48824 | A maliciously crafted RFA file, when parsed through Autodesk Revit, can force a Stack-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 21 Oct 2024 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:* |
Fri, 18 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Autodesk
Autodesk revit |
|
| CPEs | cpe:2.3:a:autodesk:revit:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Autodesk
Autodesk revit |
|
| Metrics |
ssvc
|
Wed, 16 Oct 2024 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted RFA file, when parsed through Autodesk Revit, can force a Stack-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. | |
| Title | Stack-Based Buffer Overflow Vulnerability in Autodesk Revit | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2025-01-28T20:10:30.617Z
Reserved: 2024-08-19T21:37:10.490Z
Link: CVE-2024-7994
Updated: 2024-10-18T18:00:35.755Z
Status : Analyzed
Published: 2024-10-16T22:15:03.353
Modified: 2024-10-21T18:35:55.397
Link: CVE-2024-7994
No data.
OpenCVE Enrichment
No data.
EUVD