Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10887: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk Shared Components

0
High
VulnerabilityCVE-2025-10887cvecve-2025-10887cwe-120
Published: Mon Dec 15 2025 (12/15/2025, 23:42:44 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Shared Components

Description

A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:27:41 UTC

Technical Analysis

CVE-2025-10887 is a classic buffer overflow vulnerability categorized under CWE-120, discovered in Autodesk Shared Components version 2026.0. The flaw occurs due to a lack of proper size checking when copying data from a specially crafted MODEL file during parsing. This unchecked buffer copy leads to memory corruption, which can be exploited by an attacker to execute arbitrary code within the context of the affected Autodesk process. The vulnerability requires the victim to open or process a malicious MODEL file, implying user interaction is necessary. No privileges are required to exploit this vulnerability, but the attacker must have local access or deliver the file to the user. The CVSS 3.1 base score is 7.8, reflecting high severity due to the potential for complete compromise of the affected application, impacting confidentiality, integrity, and availability. Autodesk Shared Components are widely used across multiple Autodesk products, which are prevalent in design, engineering, and manufacturing sectors. Although no public exploits are known at this time, the vulnerability poses a significant risk if weaponized. The lack of an official patch at publication heightens the urgency for mitigation and monitoring. The vulnerability's exploitation vector is local with low attack complexity but requires user interaction, making social engineering or phishing a likely delivery method. The vulnerability's scope is limited to the Autodesk Shared Components and the processes that load MODEL files, but the impact on affected systems can be severe, including arbitrary code execution and potential system compromise.

Potential Impact

The impact of CVE-2025-10887 is substantial for organizations relying on Autodesk software for critical design and engineering workflows. Successful exploitation can lead to arbitrary code execution, allowing attackers to execute malicious payloads, potentially leading to data theft, system manipulation, or disruption of operations. Confidentiality is at risk as attackers may access sensitive design files and intellectual property. Integrity can be compromised by altering design data or injecting malicious code into workflows. Availability may also be affected if the exploit causes application crashes or system instability. Given Autodesk’s widespread use in industries such as architecture, manufacturing, automotive, aerospace, and construction, the vulnerability could disrupt critical infrastructure projects and supply chains. The requirement for user interaction and local access somewhat limits remote exploitation but does not eliminate risk, especially in environments where MODEL files are shared frequently via email or collaboration platforms. The absence of known exploits currently provides a window for proactive defense, but the high severity score and potential impact warrant immediate attention.

Mitigation Recommendations

Organizations should prioritize the following mitigation steps: 1) Monitor Autodesk’s official channels for patches addressing CVE-2025-10887 and apply them immediately upon release. 2) Restrict and verify the sources of MODEL files, implementing strict file validation and sandboxing to prevent processing of untrusted files. 3) Educate users on the risks of opening MODEL files from unknown or untrusted sources to reduce the likelihood of social engineering attacks. 4) Employ runtime protections such as Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), and Control Flow Guard (CFG) to hinder exploitation attempts. 5) Use endpoint detection and response (EDR) tools to monitor for anomalous behavior indicative of exploitation attempts. 6) Implement network segmentation to limit the spread of potential compromise within the organization. 7) Regularly back up critical design data and verify backup integrity to enable recovery in case of compromise. 8) Conduct vulnerability scanning and penetration testing focused on Autodesk environments to identify and remediate related risks proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-09-23T15:29:53.577Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69409d9cd9bcdf3f3d09c708

Added to database: 12/15/2025, 11:45:32 PM

Last enriched: 2/27/2026, 6:27:41 AM

Last updated: 3/24/2026, 10:25:12 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses