CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
35.3%
A maliciously crafted DLL file can be forced to read beyond allocated boundaries in Autodesk InfraWorks 2023, and 2021 when parsing the DLL files could lead to a resource injection vulnerability.
Vendor | Product | Version | CPE |
---|---|---|---|
autodesk | infraworks | * | cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:* |
autodesk | infraworks | 2021.2 | cpe:2.3:a:autodesk:infraworks:2021.2:-:*:*:*:*:*:* |
autodesk | infraworks | 2021.2 | cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_1:*:*:*:*:*:* |
autodesk | infraworks | 2021.2 | cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_2:*:*:*:*:*:* |
autodesk | infraworks | 2021.2 | cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_3:*:*:*:*:*:* |
autodesk | infraworks | 2021.2 | cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_4:*:*:*:*:*:* |
autodesk | infraworks | 2021.2 | cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_5:*:*:*:*:*:* |
autodesk | infraworks | 2021.2 | cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_6:*:*:*:*:*:* |
autodesk | infraworks | 2021.2 | cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_7:*:*:*:*:*:* |
autodesk | infraworks | 2021.2 | cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_8:*:*:*:*:*:* |
[
{
"vendor": "n/a",
"product": "Autodesk InfraWorks",
"versions": [
{
"version": "2023, 2021",
"status": "affected"
}
]
}
]
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
35.3%