Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10883: CWE-125 Out-of-Bounds Read in Autodesk Shared Components

0
High
VulnerabilityCVE-2025-10883cvecve-2025-10883cwe-125
Published: Mon Dec 15 2025 (12/15/2025, 23:40:59 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Shared Components

Description

A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 12/16/2025, 00:04:00 UTC

Technical Analysis

CVE-2025-10883 is an out-of-bounds read vulnerability classified under CWE-125 found in Autodesk Shared Components version 2026.0. This vulnerability is triggered when the software parses a maliciously crafted CATPRODUCT file, a file format used in Autodesk’s CAD software suite. The out-of-bounds read can lead to several adverse effects: application crashes (denial of service), unauthorized reading of sensitive memory contents, and potentially arbitrary code execution within the context of the current process. The vulnerability requires the victim to open or otherwise process the malicious CATPRODUCT file, implying user interaction is necessary. No privileges are required to exploit this vulnerability, but the attacker must have local access or convince a user to open the file. The CVSS v3.1 score of 7.8 indicates a high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Currently, there are no known exploits in the wild, and no patches have been published yet. The vulnerability poses a significant risk to environments where Autodesk Shared Components are used, especially in design and manufacturing workflows that rely on CATPRODUCT files.

Potential Impact

For European organizations, the impact of CVE-2025-10883 can be substantial. Autodesk products are widely used in engineering, manufacturing, architecture, and construction sectors, which are critical to many European economies. Exploitation could lead to unauthorized disclosure of intellectual property, design documents, or sensitive project data, potentially causing competitive and financial damage. The ability to execute arbitrary code could allow attackers to establish persistence, move laterally within networks, or deploy ransomware. Denial of service through application crashes could disrupt critical design workflows, delaying projects and increasing operational costs. Given the high confidentiality, integrity, and availability impacts, organizations face risks to their data security, operational continuity, and compliance with data protection regulations such as GDPR. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where files are shared frequently or received from external sources.

Mitigation Recommendations

To mitigate CVE-2025-10883 effectively, European organizations should implement the following specific measures: 1) Restrict the opening of CATPRODUCT files to trusted sources only and educate users about the risks of opening files from unknown or untrusted origins. 2) Employ application whitelisting and sandboxing techniques to isolate Autodesk applications and limit the impact of potential exploitation. 3) Monitor file system and application logs for unusual activity related to CATPRODUCT file handling. 4) Use endpoint detection and response (EDR) tools to detect anomalous behaviors indicative of exploitation attempts. 5) Coordinate with Autodesk to obtain patches or updates as soon as they become available and prioritize their deployment. 6) Implement network segmentation to limit lateral movement if a system is compromised. 7) Regularly back up critical design data and verify backup integrity to enable recovery from potential ransomware or data corruption attacks. 8) Review and enforce least privilege principles for users running Autodesk software to reduce the potential impact of code execution within the application context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-09-23T15:29:51.242Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69409d9cd9bcdf3f3d09c6fc

Added to database: 12/15/2025, 11:45:32 PM

Last enriched: 12/16/2025, 12:04:00 AM

Last updated: 12/16/2025, 11:05:57 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats