7.8

CVE-2023-25005

A maliciously crafted DLL file can be forced to read beyond allocated boundaries in Autodesk InfraWorks 2023, and 2021 when parsing the DLL files could lead to a resource injection vulnerability.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AutodeskInfraworks Version >= 2021.0 < 2021.2
AutodeskInfraworks Version >= 2023.0 < 2023.1
AutodeskInfraworks Version2021.2 Update-
AutodeskInfraworks Version2021.2 Updatehotfix_1
AutodeskInfraworks Version2021.2 Updatehotfix_2
AutodeskInfraworks Version2021.2 Updatehotfix_3
AutodeskInfraworks Version2021.2 Updatehotfix_4
AutodeskInfraworks Version2021.2 Updatehotfix_5
AutodeskInfraworks Version2021.2 Updatehotfix_6
AutodeskInfraworks Version2021.2 Updatehotfix_7
AutodeskInfraworks Version2021.2 Updatehotfix_8
AutodeskInfraworks Version2021.2 Updatehotfix_9
AutodeskInfraworks Version2023.1 Update-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.239
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-427 Uncontrolled Search Path Element

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.