Update

Autodesk Revit

Autodesk Revit

View all applications
Patching for Windows Mac Linux

CVE Vulnerabilities for Autodesk Revit

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2025‑50402025‑07‑10 12:15:24HIGH (8)A maliciously crafted RTE file, when parsed through Autodesk Revit, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.26LOCAL
CVE‑2025‑50372025‑07‑10 12:15:23HIGH (8)A maliciously crafted RFA, RTE, or RVT file, when parsed through Autodesk Revit, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.26LOCAL
CVE‑2024‑79942024‑10‑16 22:15:03HIGH (8)A maliciously crafted RFA file, when parsed through Autodesk Revit, can force a Stack-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.26LOCAL
CVE‑2024‑79932024‑10‑16 22:15:03HIGH (8)A maliciously crafted PDF file, when parsed through Autodesk Revit, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.26LOCAL
CVE‑2023‑250042023‑06‑27 19:15:09HIGH (8)A maliciously crafted pskernel.dll file in Autodesk products is used to trigger integer overflow vulnerabilities. Exploitation of these vulnerabilities may lead to code execution.26LOCAL
CVE‑2023‑250032023‑06‑23 19:15:09HIGH (8)A maliciously crafted pskernel.dll file in Autodesk AutoCAD 2023 and Maya 2022 may be used to trigger out-of-bound read write / read vulnerabilities. Exploitation of this vulnerability may lead to code execution.26LOCAL
CVE‑2023‑250022023‑06‑27 23:15:10HIGH (8)A maliciously crafted SKP file in Autodesk products is used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.26LOCAL
CVE‑2022‑278712022‑06‑21 15:15:09HIGH (8)Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code.26LOCAL
CVE‑2021‑401662022‑10‑07 18:15:15HIGH (8)A maliciously crafted PNG file in Autodesk Image Processing component may be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by attackers to execute arbitrary code.26LOCAL
CVE‑2021‑401652022‑10‑07 18:15:15HIGH (8)A maliciously crafted TIFF, PICT, TGA, or RLC file in Autodesk Image Processing component may be used to write beyond the allocated buffer while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.26LOCAL
CVE‑2021‑401632022‑10‑07 18:15:14HIGH (8)A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through Autodesk Image Processing component.26LOCAL
CVE‑2021‑401622022‑10‑07 18:15:14HIGH (8)A maliciously crafted TIF, PICT, TGA, or RLC files in Autodesk Image Processing component may be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.26LOCAL

Deep Windows, Mac, and Linux OS patching

Stay out of the "Negligent MSP" label because Lavawall® covers:
  • 30-312 times as many applications as popular RMMs.
  • "optional" Windows patches, including firmware and drivers
  • Mac OS and application patches
  • Linux Kernel, OS, and package patches for more distribution types than we want to admit exist
Select the operating system you care about to find how Lavawall takes care of Operating System, driver, and application patches.
Windows Mac Linux

What applications does Lavawall® monitor?

Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.
Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.