Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

94 vulnerabilities found for shared_components by autodesk

CVE-2026-0874 (GCVE-0-2026-0874)

Vulnerability from nvd – Published: 2026-02-18 19:38 – Updated: 2026-05-08 18:27
VLAI?
Title
CATPART File Parsing Out-of-Bounds Write
Summary
A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CWE
Assigner
Impacted products
Vendor Product Version
Autodesk Shared Components Affected: 1.9.0.7 , < 1.10.0.4 (custom)
    cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-0874",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-19T04:55:51.174857Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T14:44:15.903Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "Shared Components",
          "vendor": "Autodesk",
          "versions": [
            {
              "lessThan": "1.10.0.4",
              "status": "affected",
              "version": "1.9.0.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
            }
          ],
          "value": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-08T18:27:20.652Z",
        "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
        "shortName": "autodesk"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0004"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://www.autodesk.com/products/autodesk-access/overview"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "CATPART File Parsing Out-of-Bounds Write",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
    "assignerShortName": "autodesk",
    "cveId": "CVE-2026-0874",
    "datePublished": "2026-02-18T19:38:32.639Z",
    "dateReserved": "2026-01-13T12:36:42.762Z",
    "dateUpdated": "2026-05-08T18:27:20.652Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-0875 (GCVE-0-2026-0875)

Vulnerability from nvd – Published: 2026-02-18 19:39 – Updated: 2026-05-08 18:27
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write
Summary
A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CWE
Assigner
Impacted products
Vendor Product Version
Autodesk Shared Components Affected: 1.9.0.7 , < 1.10.0.4 (custom)
    cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-0875",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-19T04:55:51.947581Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T14:44:15.726Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "Shared Components",
          "vendor": "Autodesk",
          "versions": [
            {
              "lessThan": "1.10.0.4",
              "status": "affected",
              "version": "1.9.0.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
            }
          ],
          "value": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-08T18:27:50.946Z",
        "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
        "shortName": "autodesk"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0004"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://www.autodesk.com/products/autodesk-access/overview"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MODEL File Parsing Out-of-Bounds Write",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
    "assignerShortName": "autodesk",
    "cveId": "CVE-2026-0875",
    "datePublished": "2026-02-18T19:39:27.111Z",
    "dateReserved": "2026-01-13T12:37:27.702Z",
    "dateUpdated": "2026-05-08T18:27:50.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-10900 (GCVE-0-2025-10900)

Vulnerability from nvd – Published: 2025-12-15 23:45 – Updated: 2026-05-07 19:40
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write Vulnerability
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CWE
Assigner
Impacted products
Vendor Product Version
Autodesk Shared Components Affected: 1.8.0.7 , < 1.9.0.7 (custom)
    cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-10900",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-17T04:55:23.119502Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T16:07:35.187Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "Shared Components",
          "vendor": "Autodesk",
          "versions": [
            {
              "lessThan": "1.9.0.7",
              "status": "affected",
              "version": "1.8.0.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.\u003cbr\u003e"
            }
          ],
          "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-Bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-07T19:40:50.876Z",
        "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
        "shortName": "autodesk"
      },
      "references": [
        {
          "tags": [
            "patch"
          ],
          "url": "https://www.autodesk.com/products/autodesk-access/overview"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MODEL File Parsing Out-of-Bounds Write Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
    "assignerShortName": "autodesk",
    "cveId": "CVE-2025-10900",
    "datePublished": "2025-12-15T23:45:26.861Z",
    "dateReserved": "2025-09-23T21:58:04.173Z",
    "dateUpdated": "2026-05-07T19:40:50.876Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-10899 (GCVE-0-2025-10899)

Vulnerability from nvd – Published: 2025-12-15 23:45 – Updated: 2026-05-07 19:40
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write Vulnerability
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CWE
Assigner
Impacted products
Vendor Product Version
Autodesk Shared Components Affected: 1.8.0.7 , < 1.9.0.7 (custom)
    cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-10899",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-17T04:55:24.893624Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T16:07:35.443Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "Shared Components",
          "vendor": "Autodesk",
          "versions": [
            {
              "lessThan": "1.9.0.7",
              "status": "affected",
              "version": "1.8.0.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.\u003cbr\u003e"
            }
          ],
          "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-Bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-07T19:40:25.329Z",
        "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
        "shortName": "autodesk"
      },
      "references": [
        {
          "tags": [
            "patch"
          ],
          "url": "https://www.autodesk.com/products/autodesk-access/overview"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MODEL File Parsing Out-of-Bounds Write Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
    "assignerShortName": "autodesk",
    "cveId": "CVE-2025-10899",
    "datePublished": "2025-12-15T23:45:00.819Z",
    "dateReserved": "2025-09-23T21:58:02.191Z",
    "dateUpdated": "2026-05-07T19:40:25.329Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-10898 (GCVE-0-2025-10898)

Vulnerability from nvd – Published: 2025-12-15 23:44 – Updated: 2026-05-07 19:39
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write Vulnerability
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CWE
Assigner
Impacted products
Vendor Product Version
Autodesk Shared Components Affected: 1.8.0.7 , < 1.9.0.7 (custom)
    cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-10898",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-17T04:55:26.594115Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T16:07:35.832Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "Shared Components",
          "vendor": "Autodesk",
          "versions": [
            {
              "lessThan": "1.9.0.7",
              "status": "affected",
              "version": "1.8.0.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.\u003cbr\u003e"
            }
          ],
          "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-Bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-07T19:39:53.637Z",
        "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
        "shortName": "autodesk"
      },
      "references": [
        {
          "tags": [
            "patch"
          ],
          "url": "https://www.autodesk.com/products/autodesk-access/overview"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MODEL File Parsing Out-of-Bounds Write Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
    "assignerShortName": "autodesk",
    "cveId": "CVE-2025-10898",
    "datePublished": "2025-12-15T23:44:26.564Z",
    "dateReserved": "2025-09-23T21:58:00.616Z",
    "dateUpdated": "2026-05-07T19:39:53.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-0875 (GCVE-0-2026-0875)

Vulnerability from cvelistv5 – Published: 2026-02-18 19:39 – Updated: 2026-05-08 18:27
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write
Summary
A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CWE
Assigner
Impacted products
Vendor Product Version
Autodesk Shared Components Affected: 1.9.0.7 , < 1.10.0.4 (custom)
    cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-0875",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-19T04:55:51.947581Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T14:44:15.726Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "Shared Components",
          "vendor": "Autodesk",
          "versions": [
            {
              "lessThan": "1.10.0.4",
              "status": "affected",
              "version": "1.9.0.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
            }
          ],
          "value": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-08T18:27:50.946Z",
        "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
        "shortName": "autodesk"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0004"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://www.autodesk.com/products/autodesk-access/overview"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MODEL File Parsing Out-of-Bounds Write",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
    "assignerShortName": "autodesk",
    "cveId": "CVE-2026-0875",
    "datePublished": "2026-02-18T19:39:27.111Z",
    "dateReserved": "2026-01-13T12:37:27.702Z",
    "dateUpdated": "2026-05-08T18:27:50.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-0874 (GCVE-0-2026-0874)

Vulnerability from cvelistv5 – Published: 2026-02-18 19:38 – Updated: 2026-05-08 18:27
VLAI?
Title
CATPART File Parsing Out-of-Bounds Write
Summary
A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CWE
Assigner
Impacted products
Vendor Product Version
Autodesk Shared Components Affected: 1.9.0.7 , < 1.10.0.4 (custom)
    cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-0874",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-19T04:55:51.174857Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T14:44:15.903Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "Shared Components",
          "vendor": "Autodesk",
          "versions": [
            {
              "lessThan": "1.10.0.4",
              "status": "affected",
              "version": "1.9.0.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
            }
          ],
          "value": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-08T18:27:20.652Z",
        "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
        "shortName": "autodesk"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0004"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://www.autodesk.com/products/autodesk-access/overview"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "CATPART File Parsing Out-of-Bounds Write",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
    "assignerShortName": "autodesk",
    "cveId": "CVE-2026-0874",
    "datePublished": "2026-02-18T19:38:32.639Z",
    "dateReserved": "2026-01-13T12:36:42.762Z",
    "dateUpdated": "2026-05-08T18:27:20.652Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-10900 (GCVE-0-2025-10900)

Vulnerability from cvelistv5 – Published: 2025-12-15 23:45 – Updated: 2026-05-07 19:40
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write Vulnerability
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CWE
Assigner
Impacted products
Vendor Product Version
Autodesk Shared Components Affected: 1.8.0.7 , < 1.9.0.7 (custom)
    cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-10900",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-17T04:55:23.119502Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T16:07:35.187Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "Shared Components",
          "vendor": "Autodesk",
          "versions": [
            {
              "lessThan": "1.9.0.7",
              "status": "affected",
              "version": "1.8.0.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.\u003cbr\u003e"
            }
          ],
          "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-Bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-07T19:40:50.876Z",
        "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
        "shortName": "autodesk"
      },
      "references": [
        {
          "tags": [
            "patch"
          ],
          "url": "https://www.autodesk.com/products/autodesk-access/overview"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MODEL File Parsing Out-of-Bounds Write Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
    "assignerShortName": "autodesk",
    "cveId": "CVE-2025-10900",
    "datePublished": "2025-12-15T23:45:26.861Z",
    "dateReserved": "2025-09-23T21:58:04.173Z",
    "dateUpdated": "2026-05-07T19:40:50.876Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-10899 (GCVE-0-2025-10899)

Vulnerability from cvelistv5 – Published: 2025-12-15 23:45 – Updated: 2026-05-07 19:40
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write Vulnerability
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CWE
Assigner
Impacted products
Vendor Product Version
Autodesk Shared Components Affected: 1.8.0.7 , < 1.9.0.7 (custom)
    cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-10899",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-17T04:55:24.893624Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T16:07:35.443Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "Shared Components",
          "vendor": "Autodesk",
          "versions": [
            {
              "lessThan": "1.9.0.7",
              "status": "affected",
              "version": "1.8.0.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.\u003cbr\u003e"
            }
          ],
          "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-Bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-07T19:40:25.329Z",
        "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
        "shortName": "autodesk"
      },
      "references": [
        {
          "tags": [
            "patch"
          ],
          "url": "https://www.autodesk.com/products/autodesk-access/overview"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MODEL File Parsing Out-of-Bounds Write Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
    "assignerShortName": "autodesk",
    "cveId": "CVE-2025-10899",
    "datePublished": "2025-12-15T23:45:00.819Z",
    "dateReserved": "2025-09-23T21:58:02.191Z",
    "dateUpdated": "2026-05-07T19:40:25.329Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-10898 (GCVE-0-2025-10898)

Vulnerability from cvelistv5 – Published: 2025-12-15 23:44 – Updated: 2026-05-07 19:39
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write Vulnerability
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CWE
Assigner
Impacted products
Vendor Product Version
Autodesk Shared Components Affected: 1.8.0.7 , < 1.9.0.7 (custom)
    cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-10898",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-17T04:55:26.594115Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T16:07:35.832Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "Shared Components",
          "vendor": "Autodesk",
          "versions": [
            {
              "lessThan": "1.9.0.7",
              "status": "affected",
              "version": "1.8.0.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.\u003cbr\u003e"
            }
          ],
          "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-Bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-07T19:39:53.637Z",
        "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
        "shortName": "autodesk"
      },
      "references": [
        {
          "tags": [
            "patch"
          ],
          "url": "https://www.autodesk.com/products/autodesk-access/overview"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MODEL File Parsing Out-of-Bounds Write Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
    "assignerShortName": "autodesk",
    "cveId": "CVE-2025-10898",
    "datePublished": "2025-12-15T23:44:26.564Z",
    "dateReserved": "2025-09-23T21:58:00.616Z",
    "dateUpdated": "2026-05-07T19:39:53.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

FKIE_CVE-2025-9454

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:38
Summary
A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-9454",
  "lastModified": "2025-12-19T14:38:59.233",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:03.170",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-9453

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:39
Summary
A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-9453",
  "lastModified": "2025-12-19T14:39:28.880",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:03.027",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-9455

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:38
Summary
A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-9455",
  "lastModified": "2025-12-19T14:38:53.483",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:03.317",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-9457

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2026-01-22 15:16
Summary
A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-9457",
  "lastModified": "2026-01-22T15:16:49.720",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-12-16T00:16:03.617",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-122"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2025-9456

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2026-01-22 15:16
Summary
A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-9456",
  "lastModified": "2026-01-22T15:16:49.570",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-12-16T00:16:03.463",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2025-9460

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:38
Summary
A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-9460",
  "lastModified": "2025-12-19T14:38:29.920",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:03.900",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-9459

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:38
Summary
A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-9459",
  "lastModified": "2025-12-19T14:38:35.750",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:03.753",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-9452

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2026-01-22 15:16
Summary
A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-9452",
  "lastModified": "2026-01-22T15:16:49.380",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-12-16T00:16:02.880",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2025-10900

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-10900",
  "lastModified": "2025-12-19T14:40:15.113",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:01.287",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-10899

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-10899",
  "lastModified": "2025-12-19T14:40:20.277",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:01.147",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-14593

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Summary
A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-14593",
  "lastModified": "2025-12-19T14:40:10.270",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:01.600",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-10898

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-10898",
  "lastModified": "2025-12-19T14:40:24.787",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:01.007",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-10886

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Summary
A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-10886",
  "lastModified": "2025-12-19T14:40:39.697",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:00.430",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-10883

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Summary
A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read  vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-10883",
  "lastModified": "2025-12-19T14:40:47.440",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:00.143",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-10889

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Summary
A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-10889",
  "lastModified": "2025-12-19T14:40:28.853",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:00.860",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-10884

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Summary
AA maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AA maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-10884",
  "lastModified": "2025-12-19T14:40:44.130",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:00.287",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-10888

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-10888",
  "lastModified": "2025-12-19T14:40:32.243",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:00.720",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-10887

Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Summary
A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-10887",
  "lastModified": "2025-12-19T14:40:35.757",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:16:00.577",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-10881

Vulnerability from fkie_nvd - Published: 2025-12-16 00:15 - Updated: 2025-12-19 14:40
Summary
A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-10881",
  "lastModified": "2025-12-19T14:40:53.823",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:15:59.493",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-122"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-10882

Vulnerability from fkie_nvd - Published: 2025-12-16 00:15 - Updated: 2025-12-19 14:40
Summary
AA maliciously crafted X_T file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
              "versionEndExcluding": "2026.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
              "matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AA maliciously crafted X_T file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
    }
  ],
  "id": "CVE-2025-10882",
  "lastModified": "2025-12-19T14:40:50.563",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@autodesk.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-12-16T00:15:59.993",
  "references": [
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Product"
      ],
      "url": "https://www.autodesk.com/products/autodesk-access/overview"
    },
    {
      "source": "psirt@autodesk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
    }
  ],
  "sourceIdentifier": "psirt@autodesk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "psirt@autodesk.com",
      "type": "Secondary"
    }
  ]
}