{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-11454","assignerOrgId":"7e40ea87-bc65-4944-9723-dd79dd760601","state":"PUBLISHED","assignerShortName":"autodesk","dateReserved":"2024-11-19T20:14:29.710Z","datePublished":"2024-12-09T17:48:30.983Z","dateUpdated":"2025-08-28T14:35:08.803Z"},"containers":{"cna":{"affected":[{"cpes":["cpe:2.3:a:autodesk:revit:2025:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"Revit","vendor":"Autodesk","versions":[{"lessThan":"2025.4","status":"affected","version":"2025","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">A maliciously crafted DLL file, when placed in the same directory as an RVT file could be loaded by Autodesk Revit, and execute arbitrary code in the context of the current process due to an untrusted search patch being utilized.</span></span><br>"}],"value":"A maliciously crafted DLL file, when placed in the same directory as an RVT file could be loaded by Autodesk Revit, and execute arbitrary code in the context of the current process due to an untrusted search patch being utilized."}],"impacts":[{"capecId":"CAPEC-471","descriptions":[{"lang":"en","value":"CAPEC-471 Search Order Hijacking"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-426","description":"CWE-426 Untrusted Search Path","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7e40ea87-bc65-4944-9723-dd79dd760601","shortName":"autodesk","dateUpdated":"2025-08-28T14:35:08.803Z"},"references":[{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0025"}],"source":{"discovery":"EXTERNAL"},"title":"Untrusted Search Path vulnerability in Autodesk Revit","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"autodesk","product":"revit","cpes":["cpe:2.3:a:autodesk:revit:2025:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2025","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-09T18:05:41.484045Z","id":"CVE-2024-11454","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-09T18:07:39.304Z"}}]}}