CVE-2025-10899: CWE-787 Out-of-Bounds Write in Autodesk Shared Components
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
AI Analysis
Technical Summary
CVE-2025-10899 is an out-of-bounds write vulnerability classified under CWE-787 found in Autodesk Shared Components version 2026.0. The vulnerability is triggered when the software parses a maliciously crafted MODEL file, leading to memory corruption. This memory corruption can cause the application to crash, corrupt data, or allow an attacker to execute arbitrary code within the context of the current process. The vulnerability has a CVSS 3.1 base score of 7.8, indicating high severity. The attack vector is local (AV:L), meaning the attacker must have local access to the system, but the attack complexity is low (AC:L), and no privileges are required (PR:N). However, user interaction is necessary (UI:R), as the victim must open the malicious MODEL file. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. While no known exploits are currently observed in the wild, the potential for exploitation exists given the ability to execute arbitrary code. Autodesk Shared Components are widely used across various Autodesk products, which are prevalent in engineering, architecture, and manufacturing industries. The vulnerability could be leveraged to compromise system confidentiality, integrity, and availability by executing malicious payloads or causing denial of service through crashes or data corruption.
Potential Impact
For European organizations, especially those in sectors heavily reliant on Autodesk products such as manufacturing, architecture, engineering, and construction, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized code execution, enabling attackers to gain control over affected systems, steal sensitive design data, or disrupt operations through crashes or data corruption. This could result in intellectual property theft, operational downtime, and reputational damage. Given the local attack vector and requirement for user interaction, the threat is more likely to materialize through targeted phishing or social engineering campaigns delivering malicious MODEL files. Organizations with lax endpoint security or insufficient user training are particularly vulnerable. The impact extends to critical infrastructure projects and industrial design workflows prevalent in Europe, potentially affecting supply chains and national infrastructure projects.
Mitigation Recommendations
1. Monitor Autodesk’s official channels for patches addressing CVE-2025-10899 and apply updates promptly once released. 2. Implement strict controls on file sources, restricting MODEL file imports to trusted origins only. 3. Employ application whitelisting to limit execution of unauthorized or unknown applications and scripts. 4. Use sandboxing or containerization techniques for Autodesk applications to isolate potential exploitation attempts. 5. Enhance endpoint security with advanced malware detection capable of identifying anomalous behavior during file parsing. 6. Conduct user awareness training focusing on the risks of opening unsolicited or suspicious MODEL files. 7. Implement network segmentation to limit lateral movement if a system is compromised. 8. Regularly back up critical design data and verify backup integrity to mitigate data corruption risks. 9. Employ monitoring and logging to detect abnormal application crashes or suspicious activities related to Autodesk products.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-10899: CWE-787 Out-of-Bounds Write in Autodesk Shared Components
Description
AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
AI-Powered Analysis
Technical Analysis
CVE-2025-10899 is an out-of-bounds write vulnerability classified under CWE-787 found in Autodesk Shared Components version 2026.0. The vulnerability is triggered when the software parses a maliciously crafted MODEL file, leading to memory corruption. This memory corruption can cause the application to crash, corrupt data, or allow an attacker to execute arbitrary code within the context of the current process. The vulnerability has a CVSS 3.1 base score of 7.8, indicating high severity. The attack vector is local (AV:L), meaning the attacker must have local access to the system, but the attack complexity is low (AC:L), and no privileges are required (PR:N). However, user interaction is necessary (UI:R), as the victim must open the malicious MODEL file. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. While no known exploits are currently observed in the wild, the potential for exploitation exists given the ability to execute arbitrary code. Autodesk Shared Components are widely used across various Autodesk products, which are prevalent in engineering, architecture, and manufacturing industries. The vulnerability could be leveraged to compromise system confidentiality, integrity, and availability by executing malicious payloads or causing denial of service through crashes or data corruption.
Potential Impact
For European organizations, especially those in sectors heavily reliant on Autodesk products such as manufacturing, architecture, engineering, and construction, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized code execution, enabling attackers to gain control over affected systems, steal sensitive design data, or disrupt operations through crashes or data corruption. This could result in intellectual property theft, operational downtime, and reputational damage. Given the local attack vector and requirement for user interaction, the threat is more likely to materialize through targeted phishing or social engineering campaigns delivering malicious MODEL files. Organizations with lax endpoint security or insufficient user training are particularly vulnerable. The impact extends to critical infrastructure projects and industrial design workflows prevalent in Europe, potentially affecting supply chains and national infrastructure projects.
Mitigation Recommendations
1. Monitor Autodesk’s official channels for patches addressing CVE-2025-10899 and apply updates promptly once released. 2. Implement strict controls on file sources, restricting MODEL file imports to trusted origins only. 3. Employ application whitelisting to limit execution of unauthorized or unknown applications and scripts. 4. Use sandboxing or containerization techniques for Autodesk applications to isolate potential exploitation attempts. 5. Enhance endpoint security with advanced malware detection capable of identifying anomalous behavior during file parsing. 6. Conduct user awareness training focusing on the risks of opening unsolicited or suspicious MODEL files. 7. Implement network segmentation to limit lateral movement if a system is compromised. 8. Regularly back up critical design data and verify backup integrity to mitigate data corruption risks. 9. Employ monitoring and logging to detect abnormal application crashes or suspicious activities related to Autodesk products.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- autodesk
- Date Reserved
- 2025-09-23T21:58:02.191Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6940a116d9bcdf3f3d0ad535
Added to database: 12/16/2025, 12:00:22 AM
Last enriched: 12/23/2025, 1:24:41 AM
Last updated: 2/7/2026, 11:22:01 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.