CVE-2024-7995

A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the VRED Design application. Exploitation of this vulnerability may lead to code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:autodesk:vred:*:*:*:*:design:*:*:*

History

18 Aug 2025, 21:15

Type Values Removed Values Added
References
  • {'url': 'https://autodesk.com/trust/security-advisories/adsk-sa-2024-0022', 'tags': ['Vendor Advisory'], 'source': 'psirt@autodesk.com'}
  • () https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0022 -

29 Jul 2025, 19:01

Type Values Removed Values Added
CPE cpe:2.3:a:autodesk:vred:*:*:*:*:design:*:*:*
First Time Autodesk
Autodesk vred
References () https://autodesk.com/trust/security-advisories/adsk-sa-2024-0022 - () https://autodesk.com/trust/security-advisories/adsk-sa-2024-0022 - Vendor Advisory

06 Nov 2024, 18:17

Type Values Removed Values Added
Summary
  • (es) Al descargar un archivo binario creado con fines malintencionados, se podría producir una escalada de privilegios a NT AUTHORITY/SYSTEM debido a que se utiliza una ruta de búsqueda no confiable en la aplicación VRED Design. La explotación de esta vulnerabilidad puede provocar la ejecución de código.

05 Nov 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-05 20:15

Updated : 2025-08-18 21:15


NVD link : CVE-2024-7995

Mitre link : CVE-2024-7995

CVE.ORG link : CVE-2024-7995


JSON object : View

Products Affected

autodesk

  • vred
CWE
CWE-426

Untrusted Search Path