### [CVE-2024-12194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12194) ![](https://img.shields.io/static/v1?label=Product&message=Navisworks%20Freedom&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Navisworks%20Manage&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Navisworks%20Simulate&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2025%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brightgreen) ### Description A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process. ### POC #### Reference - https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027 #### Github No PoCs found on GitHub currently.