7.8
CVE-2023-25005
- EPSS 0.08%
- Veröffentlicht 12.05.2023 21:15:09
- Zuletzt bearbeitet 27.01.2025 18:15:33
- Quelle psirt@autodesk.com
- CVE-Watchlists
- Unerledigt
A maliciously crafted DLL file can be forced to read beyond allocated boundaries in Autodesk InfraWorks 2023, and 2021 when parsing the DLL files could lead to a resource injection vulnerability.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Autodesk ≫ Infraworks Version >= 2021.0 < 2021.2
Autodesk ≫ Infraworks Version >= 2023.0 < 2023.1
Autodesk ≫ Infraworks Version2021.2 Update-
Autodesk ≫ Infraworks Version2021.2 Updatehotfix_1
Autodesk ≫ Infraworks Version2021.2 Updatehotfix_2
Autodesk ≫ Infraworks Version2021.2 Updatehotfix_3
Autodesk ≫ Infraworks Version2021.2 Updatehotfix_4
Autodesk ≫ Infraworks Version2021.2 Updatehotfix_5
Autodesk ≫ Infraworks Version2021.2 Updatehotfix_6
Autodesk ≫ Infraworks Version2021.2 Updatehotfix_7
Autodesk ≫ Infraworks Version2021.2 Updatehotfix_8
Autodesk ≫ Infraworks Version2021.2 Updatehotfix_9
Autodesk ≫ Infraworks Version2023.1 Update-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.08% | 0.239 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.