Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10899: CWE-787 Out-of-Bounds Write in Autodesk Shared Components

0
High
VulnerabilityCVE-2025-10899cvecve-2025-10899cwe-787
Published: Mon Dec 15 2025 (12/15/2025, 23:45:00 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Shared Components

Description

AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 12/23/2025, 01:24:41 UTC

Technical Analysis

CVE-2025-10899 is an out-of-bounds write vulnerability classified under CWE-787 found in Autodesk Shared Components version 2026.0. The vulnerability is triggered when the software parses a maliciously crafted MODEL file, leading to memory corruption. This memory corruption can cause the application to crash, corrupt data, or allow an attacker to execute arbitrary code within the context of the current process. The vulnerability has a CVSS 3.1 base score of 7.8, indicating high severity. The attack vector is local (AV:L), meaning the attacker must have local access to the system, but the attack complexity is low (AC:L), and no privileges are required (PR:N). However, user interaction is necessary (UI:R), as the victim must open the malicious MODEL file. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. While no known exploits are currently observed in the wild, the potential for exploitation exists given the ability to execute arbitrary code. Autodesk Shared Components are widely used across various Autodesk products, which are prevalent in engineering, architecture, and manufacturing industries. The vulnerability could be leveraged to compromise system confidentiality, integrity, and availability by executing malicious payloads or causing denial of service through crashes or data corruption.

Potential Impact

For European organizations, especially those in sectors heavily reliant on Autodesk products such as manufacturing, architecture, engineering, and construction, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized code execution, enabling attackers to gain control over affected systems, steal sensitive design data, or disrupt operations through crashes or data corruption. This could result in intellectual property theft, operational downtime, and reputational damage. Given the local attack vector and requirement for user interaction, the threat is more likely to materialize through targeted phishing or social engineering campaigns delivering malicious MODEL files. Organizations with lax endpoint security or insufficient user training are particularly vulnerable. The impact extends to critical infrastructure projects and industrial design workflows prevalent in Europe, potentially affecting supply chains and national infrastructure projects.

Mitigation Recommendations

1. Monitor Autodesk’s official channels for patches addressing CVE-2025-10899 and apply updates promptly once released. 2. Implement strict controls on file sources, restricting MODEL file imports to trusted origins only. 3. Employ application whitelisting to limit execution of unauthorized or unknown applications and scripts. 4. Use sandboxing or containerization techniques for Autodesk applications to isolate potential exploitation attempts. 5. Enhance endpoint security with advanced malware detection capable of identifying anomalous behavior during file parsing. 6. Conduct user awareness training focusing on the risks of opening unsolicited or suspicious MODEL files. 7. Implement network segmentation to limit lateral movement if a system is compromised. 8. Regularly back up critical design data and verify backup integrity to mitigate data corruption risks. 9. Employ monitoring and logging to detect abnormal application crashes or suspicious activities related to Autodesk products.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-09-23T21:58:02.191Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6940a116d9bcdf3f3d0ad535

Added to database: 12/16/2025, 12:00:22 AM

Last enriched: 12/23/2025, 1:24:41 AM

Last updated: 2/5/2026, 10:58:24 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats