Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10885: CWE-250 Execution with Unnecessary Privileges in Autodesk Installer

0
High
VulnerabilityCVE-2025-10885cvecve-2025-10885cwe-250
Published: Thu Nov 06 2025 (11/06/2025, 17:01:19 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Installer

Description

A maliciously crafted file, when executed on the victim's machine, can lead to privilege escalation to NT AUTHORITY/SYSTEM due to an insufficient validation of loaded binaries. An attacker with local and low-privilege access could exploit this to execute code as SYSTEM.

AI-Powered Analysis

AILast updated: 11/13/2025, 19:16:56 UTC

Technical Analysis

CVE-2025-10885 is a vulnerability classified under CWE-250 (Execution with Unnecessary Privileges) affecting Autodesk Installer version 2.18. The root cause is insufficient validation of binaries loaded during the installation process, which allows an attacker with local, low-privilege access to execute a maliciously crafted file that escalates privileges to NT AUTHORITY/SYSTEM. This escalation grants the attacker full control over the affected system, enabling them to execute arbitrary code with the highest privileges. The attack vector is local (AV:L), requiring low attack complexity (AC:L), no privileges (PR:N), but user interaction (UI:R) is necessary, meaning the user must execute the malicious file. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are known yet and no patches have been released, the vulnerability poses a significant risk due to the potential for complete system compromise. Autodesk Installer is widely used in professional environments, particularly in sectors such as engineering, architecture, and manufacturing, where Autodesk software is prevalent. The vulnerability could be leveraged by insiders or attackers who have gained limited local access to escalate privileges and move laterally within networks. The lack of patches necessitates proactive mitigation until a vendor fix is available.

Potential Impact

For European organizations, this vulnerability could lead to severe consequences including unauthorized access to sensitive intellectual property, disruption of critical design and manufacturing workflows, and potential compromise of broader IT infrastructure. Attackers exploiting this flaw can gain SYSTEM-level privileges, enabling them to disable security controls, install persistent malware, or exfiltrate confidential data. Industries heavily reliant on Autodesk software, such as automotive, aerospace, construction, and energy sectors, face heightened risks. The impact extends beyond individual workstations to network-wide security, as SYSTEM-level access can facilitate lateral movement and privilege escalation across enterprise environments. Given the high confidentiality, integrity, and availability impact, exploitation could result in significant operational downtime, financial losses, and reputational damage. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk from insider threats or compromised endpoints.

Mitigation Recommendations

European organizations should implement strict access controls to limit local user permissions and restrict the execution of untrusted files, especially within environments where Autodesk Installer is used. Employ application whitelisting and endpoint protection solutions to detect and block execution of unauthorized binaries. Monitor installer execution logs and system events for unusual activity indicative of privilege escalation attempts. Educate users about the risks of executing unverified files and enforce policies to prevent running unauthorized installers or scripts. Network segmentation can help contain potential compromises originating from exploited systems. Until Autodesk releases a patch, consider temporarily restricting Autodesk Installer usage to trusted administrators or isolated environments. Regularly review and update endpoint security configurations and maintain up-to-date backups to facilitate recovery from potential attacks. Engage with Autodesk support channels to obtain timely updates and advisories regarding patches or workarounds.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-09-23T15:29:52.416Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690cd7dc70ae18879c793e61

Added to database: 11/6/2025, 5:16:12 PM

Last enriched: 11/13/2025, 7:16:56 PM

Last updated: 12/22/2025, 7:24:07 AM

Views: 135

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-15014: SQL Injection in loganhong php loganSite

Medium
VulnerabilityMon Dec 22 2025

CVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

High
VulnerabilityMon Dec 22 2025

CVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats