Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 26 Aug 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 26 Aug 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 08 May 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:* |
Mon, 09 Dec 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Autodesk
Autodesk revit |
|
CPEs | cpe:2.3:a:autodesk:revit:2025:*:*:*:*:*:*:* | |
Vendors & Products |
Autodesk
Autodesk revit |
|
Metrics |
ssvc
|
Mon, 09 Dec 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A maliciously crafted DLL file, when placed in the same directory as an RVT file could be loaded by Autodesk Revit, and execute arbitrary code in the context of the current process due to an untrusted search patch being utilized. | |
Title | Untrusted Search Path vulnerability in Autodesk Revit | |
Weaknesses | CWE-426 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2025-08-28T14:35:08.803Z
Reserved: 2024-11-19T20:14:29.710Z
Link: CVE-2024-11454

Updated: 2024-12-09T18:07:31.165Z

Status : Analyzed
Published: 2024-12-09T18:15:22.400
Modified: 2025-09-26T17:48:10.207
Link: CVE-2024-11454

No data.

No data.