Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
advance_steel Vendor: autodesk

About This Product

advance_steel is a software product offered by autodesk. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 122 known vulnerabilities affecting autodesk advance_steel. This includes 121 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2019 to 2026, indicating a sustained research interest and ongoing security attention. and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2019-7358 2019-04-09 2024-11-21 7.8 6.8 Likely
CVE-2019-7359 2019-04-09 2024-11-21 7.8 6.8 Likely
CVE-2019-7360 2019-04-09 2024-11-21 7.8 6.8 Likely
CVE-2019-7361 2019-04-09 2024-11-21 7.8 6.8 Likely
CVE-2019-7364 2019-08-23 2024-11-21 7.8 6.8 Likely
CVE-2021-27040 2021-06-25 2024-11-21 3.3 4.3 Likely
CVE-2021-27041 2021-06-25 2024-11-21 7.8 6.8 Likely
CVE-2021-27042 2021-06-25 2024-11-21 7.8 6.8 Likely
CVE-2021-27043 2021-06-25 2024-11-21 7.8 6.8 Likely
CVE-2021-40160 2021-12-23 2024-11-21 7.8 6.8 Likely
CVE-2021-40161 2021-12-23 2024-11-21 7.8 4.4 Unknown
CVE-2021-40158 2022-01-25 2024-11-21 7.8 6.8 Likely
CVE-2021-40159 2022-01-25 2024-11-21 7.8 6.8 Likely
CVE-2022-25789 2022-04-11 2024-11-21 7.8 6.8 Likely
CVE-2022-25790 2022-04-11 2024-11-21 7.8 6.8 Likely
CVE-2022-25791 2022-04-11 2024-11-21 7.8 4.4 Unknown
CVE-2022-25792 2022-04-11 2024-11-21 7.8 6.8 Likely
CVE-2022-27529 2022-04-18 2024-11-21 7.8 6.8 Likely
CVE-2022-27530 2022-04-18 2024-11-21 7.8 6.8 Likely
CVE-2022-25788 2022-04-19 2024-11-21 7.8 6.8 Likely
CVE-2022-27871 2022-06-21 2024-11-21 7.8 6.8 Likely
CVE-2024-0446 2024-02-22 2025-09-26 7.8 - -
CVE-2024-23120 2024-02-22 2025-09-26 7.8 - -
CVE-2024-23121 2024-02-22 2025-09-26 7.8 - -
CVE-2024-23122 2024-02-22 2025-09-26 7.8 - -
CVE-2024-23123 2024-02-22 2025-09-26 7.8 - -
CVE-2024-23124 2024-02-22 2025-11-13 7.8 - -
CVE-2024-23125 2024-02-22 2025-12-31 7.8 - -
CVE-2024-23126 2024-02-22 2025-12-31 7.8 - -
CVE-2024-23127 2024-02-22 2025-12-31 7.8 - -
CVE-2024-23128 2024-02-22 2025-12-31 7.8 - -
CVE-2024-23129 2024-02-22 2025-12-31 7.8 - -
CVE-2024-23130 2024-02-22 2025-12-31 7.8 - -
CVE-2024-23131 2024-02-22 2025-12-31 7.8 - -
CVE-2024-23132 2024-02-22 2025-04-11 7.8 - -
CVE-2024-23133 2024-02-22 2025-12-31 7.8 - -
CVE-2024-23134 2024-02-22 2025-12-31 7.8 - -
CVE-2024-23135 2024-02-22 2025-12-31 7.8 - -
CVE-2024-23136 2024-02-22 2025-12-31 7.8 - -
CVE-2024-23137 2024-02-22 2025-04-11 7.8 - -
CVE-2024-23138 2024-03-18 2025-12-31 7.8 - -
CVE-2024-23140 2024-06-25 2025-12-31 7.8 - -
CVE-2024-23141 2024-06-25 2025-12-31 7.8 - -
CVE-2024-23142 2024-06-25 2025-12-31 7.8 - -
CVE-2024-23143 2024-06-25 2025-09-26 7.8 - -
CVE-2024-23144 2024-06-25 2025-11-14 7.8 - -
CVE-2024-23145 2024-06-25 2025-11-13 7.8 - -
CVE-2024-23146 2024-06-25 2025-11-13 7.8 - -
CVE-2024-23147 2024-06-25 2026-01-22 7.8 - -
CVE-2024-23148 2024-06-25 2026-01-22 7.8 - -
CVE-2024-23149 2024-06-25 2025-11-13 7.8 - -
CVE-2024-37000 2024-06-25 2026-01-22 7.8 - -
CVE-2024-37001 2024-06-25 2025-11-13 7.8 - -
CVE-2024-37002 2024-06-25 2025-11-13 7.8 - -
CVE-2024-23150 2024-06-25 2025-11-13 7.8 - -
CVE-2024-23151 2024-06-25 2025-05-06 7.8 - -
CVE-2024-23152 2024-06-25 2025-11-13 7.8 - -
CVE-2024-23153 2024-06-25 2025-11-13 7.8 - -
CVE-2024-23154 2024-06-25 2025-11-13 7.8 - -
CVE-2024-23155 2024-06-25 2025-05-06 7.8 - -
CVE-2024-23156 2024-06-25 2026-01-22 7.8 - -
CVE-2024-23157 2024-06-25 2026-01-22 7.8 - -
CVE-2024-23158 2024-06-25 2025-11-13 7.8 - -
CVE-2024-23159 2024-06-25 2025-11-13 7.8 - -
CVE-2024-36999 2024-06-25 2025-11-13 7.8 - -
CVE-2024-37003 2024-06-25 2025-11-13 7.8 - -
CVE-2024-37004 2024-06-25 2025-11-13 7.8 - -
CVE-2024-37005 2024-06-25 2025-11-13 7.8 - -
CVE-2024-37006 2024-06-25 2026-01-22 7.8 - -
CVE-2024-37007 2024-06-25 2025-05-06 7.8 - -
CVE-2024-7305 2024-08-20 2025-07-30 7.8 - -
CVE-2024-8587 2024-10-29 2024-12-16 7.8 - -
CVE-2025-1427 2025-03-13 2025-08-19 7.8 - -
CVE-2025-1428 2025-03-13 2025-08-19 7.8 - -
CVE-2025-1429 2025-03-13 2025-08-19 7.8 - -
CVE-2025-1430 2025-03-13 2025-08-19 7.8 - -
CVE-2025-1431 2025-03-13 2025-08-19 7.8 - -
CVE-2025-1432 2025-03-13 2025-11-13 7.8 - -
CVE-2025-1433 2025-03-13 2025-08-19 7.8 - -
CVE-2025-1649 2025-03-13 2025-08-19 7.8 - -
CVE-2025-1650 2025-03-13 2025-08-19 7.8 - -
CVE-2025-1651 2025-03-13 2025-08-19 7.8 - -
CVE-2025-1652 2025-03-13 2025-08-19 7.8 - -
CVE-2025-1275 2025-04-15 2025-08-19 7.8 - -
CVE-2025-1276 2025-04-15 2025-08-19 7.8 - -
CVE-2025-5038 2025-07-29 2025-08-19 7.8 - -
CVE-2025-5043 2025-07-29 2025-08-19 7.8 - -
CVE-2025-6631 2025-07-29 2025-08-19 7.8 - -
CVE-2025-6635 2025-07-29 2025-08-19 7.8 - -
CVE-2025-6636 2025-07-29 2025-08-19 7.8 - -
CVE-2025-6637 2025-07-29 2025-08-19 7.8 - -
CVE-2025-7497 2025-07-29 2025-08-19 7.8 - -
CVE-2025-7675 2025-07-29 2025-08-19 7.8 - -
CVE-2025-5046 2025-08-15 2025-08-20 7.8 - -
CVE-2025-5047 2025-08-15 2025-08-20 7.8 - -
CVE-2025-5048 2025-08-15 2025-08-20 7.8 - -
CVE-2025-8893 2025-09-16 2025-09-19 7.8 - -
CVE-2025-8894 2025-09-16 2025-09-19 7.8 - -
CVE-2025-8892 2025-09-22 2025-09-25 7.8 - -
CVE-2025-9458 2025-11-07 2026-01-22 7.8 - -
CVE-2025-10881 2025-12-16 2025-12-19 7.8 - -
CVE-2025-10882 2025-12-16 2025-12-19 7.8 - -
CVE-2025-10883 2025-12-16 2025-12-19 7.8 - -
CVE-2025-10884 2025-12-16 2025-12-19 7.8 - -
CVE-2025-10886 2025-12-16 2025-12-19 7.8 - -
CVE-2025-10887 2025-12-16 2025-12-19 7.8 - -
CVE-2025-10888 2025-12-16 2025-12-19 7.8 - -
CVE-2025-10889 2025-12-16 2025-12-19 7.8 - -
CVE-2025-10898 2025-12-16 2025-12-19 7.8 - -
CVE-2025-10899 2025-12-16 2025-12-19 7.8 - -
CVE-2025-10900 2025-12-16 2025-12-19 7.8 - -
CVE-2025-14593 2025-12-16 2025-12-19 7.8 - -
CVE-2025-9452 2025-12-16 2026-01-22 7.8 - -
CVE-2025-9453 2025-12-16 2025-12-19 7.8 - -
CVE-2025-9454 2025-12-16 2025-12-19 7.8 - -
CVE-2025-9455 2025-12-16 2025-12-19 7.8 - -
CVE-2025-9456 2025-12-16 2026-01-22 7.8 - -
CVE-2025-9457 2025-12-16 2026-01-22 7.8 - -
CVE-2025-9459 2025-12-16 2025-12-19 7.8 - -
CVE-2025-9460 2025-12-16 2025-12-19 7.8 - -
CVE-2026-0874 2026-02-18 2026-02-20 7.8 - -
CVE-2026-0875 2026-02-18 2026-02-20 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for autodesk advance_steel by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.