A maliciously crafted DLL file when placed in temporary files and folders that are leveraged by the Autodesk Installer could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to insecure privilege management.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Autodesk
Autodesk installer |
|
CPEs | cpe:2.3:a:autodesk:installer:*:*:*:*:*:*:*:* | |
Vendors & Products |
Autodesk
Autodesk installer |
|
Metrics |
ssvc
|
Fri, 15 Nov 2024 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A maliciously crafted DLL file when placed in temporary files and folders that are leveraged by the Autodesk Installer could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to insecure privilege management. | |
Title | Autodesk ADP Desktop SDK Privilege Escalation Vulnerability | |
Weaknesses | CWE-269 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: autodesk
Published: 2024-11-15T21:24:22.732Z
Updated: 2024-11-18T19:01:48.701Z
Reserved: 2024-10-03T19:00:57.631Z
Link: CVE-2024-9500
Vulnrichment
Updated: 2024-11-18T19:01:44.890Z
NVD
Status : Awaiting Analysis
Published: 2024-11-15T22:15:16.580
Modified: 2024-11-18T17:11:17.393
Link: CVE-2024-9500
Redhat
No data.