Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
94 vulnerabilities found for shared_components by autodesk
CVE-2026-0874 (GCVE-0-2026-0874)
Vulnerability from nvd – Published: 2026-02-18 19:38 – Updated: 2026-05-08 18:27
VLAI?
Title
CATPART File Parsing Out-of-Bounds Write
Summary
A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Severity ?
7.8 (High)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Autodesk | Shared Components |
Affected:
1.9.0.7 , < 1.10.0.4
(custom)
cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-0874",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-19T04:55:51.174857Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T14:44:15.903Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Shared Components",
"vendor": "Autodesk",
"versions": [
{
"lessThan": "1.10.0.4",
"status": "affected",
"version": "1.9.0.7",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"value": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-08T18:27:20.652Z",
"orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"shortName": "autodesk"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0004"
},
{
"tags": [
"patch"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CATPART File Parsing Out-of-Bounds Write",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"assignerShortName": "autodesk",
"cveId": "CVE-2026-0874",
"datePublished": "2026-02-18T19:38:32.639Z",
"dateReserved": "2026-01-13T12:36:42.762Z",
"dateUpdated": "2026-05-08T18:27:20.652Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-0875 (GCVE-0-2026-0875)
Vulnerability from nvd – Published: 2026-02-18 19:39 – Updated: 2026-05-08 18:27
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write
Summary
A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Severity ?
7.8 (High)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Autodesk | Shared Components |
Affected:
1.9.0.7 , < 1.10.0.4
(custom)
cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-0875",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-19T04:55:51.947581Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T14:44:15.726Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Shared Components",
"vendor": "Autodesk",
"versions": [
{
"lessThan": "1.10.0.4",
"status": "affected",
"version": "1.9.0.7",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"value": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-08T18:27:50.946Z",
"orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"shortName": "autodesk"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0004"
},
{
"tags": [
"patch"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MODEL File Parsing Out-of-Bounds Write",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"assignerShortName": "autodesk",
"cveId": "CVE-2026-0875",
"datePublished": "2026-02-18T19:39:27.111Z",
"dateReserved": "2026-01-13T12:37:27.702Z",
"dateUpdated": "2026-05-08T18:27:50.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-10900 (GCVE-0-2025-10900)
Vulnerability from nvd – Published: 2025-12-15 23:45 – Updated: 2026-05-07 19:40
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write Vulnerability
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Severity ?
7.8 (High)
CWE
- CWE-787 - Out-of-Bounds Write
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Autodesk | Shared Components |
Affected:
1.8.0.7 , < 1.9.0.7
(custom)
cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-10900",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-17T04:55:23.119502Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T16:07:35.187Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Shared Components",
"vendor": "Autodesk",
"versions": [
{
"lessThan": "1.9.0.7",
"status": "affected",
"version": "1.8.0.7",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.\u003cbr\u003e"
}
],
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-Bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-07T19:40:50.876Z",
"orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"shortName": "autodesk"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MODEL File Parsing Out-of-Bounds Write Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"assignerShortName": "autodesk",
"cveId": "CVE-2025-10900",
"datePublished": "2025-12-15T23:45:26.861Z",
"dateReserved": "2025-09-23T21:58:04.173Z",
"dateUpdated": "2026-05-07T19:40:50.876Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-10899 (GCVE-0-2025-10899)
Vulnerability from nvd – Published: 2025-12-15 23:45 – Updated: 2026-05-07 19:40
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write Vulnerability
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Severity ?
7.8 (High)
CWE
- CWE-787 - Out-of-Bounds Write
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Autodesk | Shared Components |
Affected:
1.8.0.7 , < 1.9.0.7
(custom)
cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-10899",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-17T04:55:24.893624Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T16:07:35.443Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Shared Components",
"vendor": "Autodesk",
"versions": [
{
"lessThan": "1.9.0.7",
"status": "affected",
"version": "1.8.0.7",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.\u003cbr\u003e"
}
],
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-Bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-07T19:40:25.329Z",
"orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"shortName": "autodesk"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MODEL File Parsing Out-of-Bounds Write Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"assignerShortName": "autodesk",
"cveId": "CVE-2025-10899",
"datePublished": "2025-12-15T23:45:00.819Z",
"dateReserved": "2025-09-23T21:58:02.191Z",
"dateUpdated": "2026-05-07T19:40:25.329Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-10898 (GCVE-0-2025-10898)
Vulnerability from nvd – Published: 2025-12-15 23:44 – Updated: 2026-05-07 19:39
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write Vulnerability
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Severity ?
7.8 (High)
CWE
- CWE-787 - Out-of-Bounds Write
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Autodesk | Shared Components |
Affected:
1.8.0.7 , < 1.9.0.7
(custom)
cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-10898",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-17T04:55:26.594115Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T16:07:35.832Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Shared Components",
"vendor": "Autodesk",
"versions": [
{
"lessThan": "1.9.0.7",
"status": "affected",
"version": "1.8.0.7",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.\u003cbr\u003e"
}
],
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-Bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-07T19:39:53.637Z",
"orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"shortName": "autodesk"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MODEL File Parsing Out-of-Bounds Write Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"assignerShortName": "autodesk",
"cveId": "CVE-2025-10898",
"datePublished": "2025-12-15T23:44:26.564Z",
"dateReserved": "2025-09-23T21:58:00.616Z",
"dateUpdated": "2026-05-07T19:39:53.637Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-0875 (GCVE-0-2026-0875)
Vulnerability from cvelistv5 – Published: 2026-02-18 19:39 – Updated: 2026-05-08 18:27
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write
Summary
A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Severity ?
7.8 (High)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Autodesk | Shared Components |
Affected:
1.9.0.7 , < 1.10.0.4
(custom)
cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-0875",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-19T04:55:51.947581Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T14:44:15.726Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Shared Components",
"vendor": "Autodesk",
"versions": [
{
"lessThan": "1.10.0.4",
"status": "affected",
"version": "1.9.0.7",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"value": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-08T18:27:50.946Z",
"orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"shortName": "autodesk"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0004"
},
{
"tags": [
"patch"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MODEL File Parsing Out-of-Bounds Write",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"assignerShortName": "autodesk",
"cveId": "CVE-2026-0875",
"datePublished": "2026-02-18T19:39:27.111Z",
"dateReserved": "2026-01-13T12:37:27.702Z",
"dateUpdated": "2026-05-08T18:27:50.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-0874 (GCVE-0-2026-0874)
Vulnerability from cvelistv5 – Published: 2026-02-18 19:38 – Updated: 2026-05-08 18:27
VLAI?
Title
CATPART File Parsing Out-of-Bounds Write
Summary
A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Severity ?
7.8 (High)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Autodesk | Shared Components |
Affected:
1.9.0.7 , < 1.10.0.4
(custom)
cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-0874",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-19T04:55:51.174857Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T14:44:15.903Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:autodesk:shared_components:1.9.0.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Shared Components",
"vendor": "Autodesk",
"versions": [
{
"lessThan": "1.10.0.4",
"status": "affected",
"version": "1.9.0.7",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"value": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-08T18:27:20.652Z",
"orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"shortName": "autodesk"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0004"
},
{
"tags": [
"patch"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CATPART File Parsing Out-of-Bounds Write",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"assignerShortName": "autodesk",
"cveId": "CVE-2026-0874",
"datePublished": "2026-02-18T19:38:32.639Z",
"dateReserved": "2026-01-13T12:36:42.762Z",
"dateUpdated": "2026-05-08T18:27:20.652Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-10900 (GCVE-0-2025-10900)
Vulnerability from cvelistv5 – Published: 2025-12-15 23:45 – Updated: 2026-05-07 19:40
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write Vulnerability
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Severity ?
7.8 (High)
CWE
- CWE-787 - Out-of-Bounds Write
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Autodesk | Shared Components |
Affected:
1.8.0.7 , < 1.9.0.7
(custom)
cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-10900",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-17T04:55:23.119502Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T16:07:35.187Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Shared Components",
"vendor": "Autodesk",
"versions": [
{
"lessThan": "1.9.0.7",
"status": "affected",
"version": "1.8.0.7",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.\u003cbr\u003e"
}
],
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-Bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-07T19:40:50.876Z",
"orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"shortName": "autodesk"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MODEL File Parsing Out-of-Bounds Write Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"assignerShortName": "autodesk",
"cveId": "CVE-2025-10900",
"datePublished": "2025-12-15T23:45:26.861Z",
"dateReserved": "2025-09-23T21:58:04.173Z",
"dateUpdated": "2026-05-07T19:40:50.876Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-10899 (GCVE-0-2025-10899)
Vulnerability from cvelistv5 – Published: 2025-12-15 23:45 – Updated: 2026-05-07 19:40
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write Vulnerability
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Severity ?
7.8 (High)
CWE
- CWE-787 - Out-of-Bounds Write
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Autodesk | Shared Components |
Affected:
1.8.0.7 , < 1.9.0.7
(custom)
cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-10899",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-17T04:55:24.893624Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T16:07:35.443Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Shared Components",
"vendor": "Autodesk",
"versions": [
{
"lessThan": "1.9.0.7",
"status": "affected",
"version": "1.8.0.7",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.\u003cbr\u003e"
}
],
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-Bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-07T19:40:25.329Z",
"orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"shortName": "autodesk"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MODEL File Parsing Out-of-Bounds Write Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"assignerShortName": "autodesk",
"cveId": "CVE-2025-10899",
"datePublished": "2025-12-15T23:45:00.819Z",
"dateReserved": "2025-09-23T21:58:02.191Z",
"dateUpdated": "2026-05-07T19:40:25.329Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-10898 (GCVE-0-2025-10898)
Vulnerability from cvelistv5 – Published: 2025-12-15 23:44 – Updated: 2026-05-07 19:39
VLAI?
Title
MODEL File Parsing Out-of-Bounds Write Vulnerability
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
Severity ?
7.8 (High)
CWE
- CWE-787 - Out-of-Bounds Write
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Autodesk | Shared Components |
Affected:
1.8.0.7 , < 1.9.0.7
(custom)
cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-10898",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-17T04:55:26.594115Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T16:07:35.832Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:autodesk:shared_components:1.8.0.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Shared Components",
"vendor": "Autodesk",
"versions": [
{
"lessThan": "1.9.0.7",
"status": "affected",
"version": "1.8.0.7",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.\u003cbr\u003e"
}
],
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-Bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-07T19:39:53.637Z",
"orgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"shortName": "autodesk"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MODEL File Parsing Out-of-Bounds Write Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601",
"assignerShortName": "autodesk",
"cveId": "CVE-2025-10898",
"datePublished": "2025-12-15T23:44:26.564Z",
"dateReserved": "2025-09-23T21:58:00.616Z",
"dateUpdated": "2026-05-07T19:39:53.637Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
FKIE_CVE-2025-9454
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:38
Severity ?
Summary
A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-9454",
"lastModified": "2025-12-19T14:38:59.233",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:03.170",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-9453
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:39
Severity ?
Summary
A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-9453",
"lastModified": "2025-12-19T14:39:28.880",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:03.027",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-9455
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:38
Severity ?
Summary
A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-9455",
"lastModified": "2025-12-19T14:38:53.483",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:03.317",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-9457
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2026-01-22 15:16
Severity ?
Summary
A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-9457",
"lastModified": "2026-01-22T15:16:49.720",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
},
"published": "2025-12-16T00:16:03.617",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2025-9456
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2026-01-22 15:16
Severity ?
Summary
A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-9456",
"lastModified": "2026-01-22T15:16:49.570",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
},
"published": "2025-12-16T00:16:03.463",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2025-9460
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:38
Severity ?
Summary
A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-9460",
"lastModified": "2025-12-19T14:38:29.920",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:03.900",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-9459
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:38
Severity ?
Summary
A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-9459",
"lastModified": "2025-12-19T14:38:35.750",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:03.753",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-9452
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2026-01-22 15:16
Severity ?
Summary
A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-9452",
"lastModified": "2026-01-22T15:16:49.380",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
},
"published": "2025-12-16T00:16:02.880",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2025-10900
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Severity ?
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-10900",
"lastModified": "2025-12-19T14:40:15.113",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:01.287",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-10899
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Severity ?
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-10899",
"lastModified": "2025-12-19T14:40:20.277",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:01.147",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-14593
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Severity ?
Summary
A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-14593",
"lastModified": "2025-12-19T14:40:10.270",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:01.600",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-10898
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Severity ?
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-10898",
"lastModified": "2025-12-19T14:40:24.787",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:01.007",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-10886
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Severity ?
Summary
A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-10886",
"lastModified": "2025-12-19T14:40:39.697",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:00.430",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-10883
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Severity ?
Summary
A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-10883",
"lastModified": "2025-12-19T14:40:47.440",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:00.143",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-10889
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Severity ?
Summary
A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-10889",
"lastModified": "2025-12-19T14:40:28.853",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:00.860",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-10884
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Severity ?
Summary
AA maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AA maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-10884",
"lastModified": "2025-12-19T14:40:44.130",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:00.287",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-10888
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Severity ?
Summary
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-10888",
"lastModified": "2025-12-19T14:40:32.243",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:00.720",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-10887
Vulnerability from fkie_nvd - Published: 2025-12-16 00:16 - Updated: 2025-12-19 14:40
Severity ?
Summary
A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-10887",
"lastModified": "2025-12-19T14:40:35.757",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:16:00.577",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-10881
Vulnerability from fkie_nvd - Published: 2025-12-16 00:15 - Updated: 2025-12-19 14:40
Severity ?
Summary
A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-10881",
"lastModified": "2025-12-19T14:40:53.823",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:15:59.493",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-10882
Vulnerability from fkie_nvd - Published: 2025-12-16 00:15 - Updated: 2025-12-19 14:40
Severity ?
Summary
AA maliciously crafted X_T file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| autodesk | shared_components | * | |
| autodesk | 3ds_max | 2026 | |
| autodesk | advance_steel | 2026 | |
| autodesk | autocad | 2026 | |
| autodesk | autocad_architecture | 2026 | |
| autodesk | autocad_electrical | 2026 | |
| autodesk | autocad_map_3d | 2026 | |
| autodesk | autocad_mechanical | 2026 | |
| autodesk | autocad_mep | 2026 | |
| autodesk | autocad_plant_3d | 2026 | |
| autodesk | civil_3d | 2026 | |
| autodesk | infraworks | 2026 | |
| autodesk | inventor | 2026 | |
| autodesk | revit | 2026 | |
| autodesk | revit_lt | 2026 | |
| autodesk | vault | 2026 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:shared_components:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E85F6F-29B5-466C-85AD-79FC25372EFD",
"versionEndExcluding": "2026.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "B938D507-D95A-4EAD-86AB-9B52A3682414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "68738B5A-B918-4CA3-BD13-4040B3219AFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "8890EECB-7AB5-41A3-8E77-314183BC3AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "CE935915-6926-474F-B5A4-7E77EF7426DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC23105-1362-4BFE-9C93-F0AAA5BAF2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB79016-0BB6-4E8A-8AE3-5AB39A252DED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "4A159D88-990D-41D7-B6B0-D97B38241860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "046ADE16-4275-4BEF-9A71-480E709383F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB9FCDC-6717-44EB-AA55-983A771E2460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "3383C40E-DD43-4146-9B58-C44585E40985",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
"matchCriteriaId": "1B01CD79-B993-47BB-B775-C10422FB956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "F7393B89-15A9-4709-9FF3-DA1C88770594",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "58A56B67-B754-4525-995A-F70CAA6B5AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3C0C68-F0D7-4737-8D37-D99F128DAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
"matchCriteriaId": "08F81FC1-1B7C-40AF-88DB-B62F24CFA21C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AA maliciously crafted X_T file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
}
],
"id": "CVE-2025-10882",
"lastModified": "2025-12-19T14:40:50.563",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "psirt@autodesk.com",
"type": "Primary"
}
]
},
"published": "2025-12-16T00:15:59.993",
"references": [
{
"source": "psirt@autodesk.com",
"tags": [
"Product"
],
"url": "https://www.autodesk.com/products/autodesk-access/overview"
},
{
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024"
}
],
"sourceIdentifier": "psirt@autodesk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "psirt@autodesk.com",
"type": "Secondary"
}
]
}