Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11795: CWE-787 Out-of-bounds Write in Autodesk 3ds Max

0
High
VulnerabilityCVE-2025-11795cvecve-2025-11795cwe-787
Published: Wed Nov 12 2025 (11/12/2025, 16:24:30 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: 3ds Max

Description

A maliciously crafted JPG file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 11/12/2025, 16:32:12 UTC

Technical Analysis

CVE-2025-11795 is an out-of-bounds write vulnerability classified under CWE-787 that affects Autodesk 3ds Max 2026. The flaw arises when the software parses a maliciously crafted JPG image file, leading to memory corruption through writing outside the intended buffer boundaries. This memory corruption can be exploited by attackers to execute arbitrary code with the privileges of the 3ds Max process. The vulnerability requires the victim to open or import the malicious JPG file, implying user interaction is necessary. No prior authentication is needed, but local access or delivery of the malicious file through social engineering or compromised file sources is required. The CVSS v3.1 base score is 7.8, indicating high severity, with metrics reflecting low attack complexity, no privileges required, but user interaction needed. The impact includes potential full compromise of the affected system's confidentiality, integrity, and availability. Currently, no public exploits or patches have been released, but the vulnerability is publicly disclosed and should be treated with urgency. Autodesk 3ds Max is widely used in 3D modeling, animation, and rendering, making this vulnerability particularly relevant to creative industries. The lack of a patch increases the risk window, and attackers may develop exploits targeting this flaw.

Potential Impact

For European organizations, especially those in media production, animation, gaming, and design sectors that rely on Autodesk 3ds Max 2026, this vulnerability poses a significant risk. Successful exploitation could lead to arbitrary code execution, allowing attackers to install malware, steal intellectual property, disrupt operations, or pivot within networks. Given the high confidentiality and integrity impact, sensitive design files and proprietary assets could be compromised. The requirement for user interaction means phishing or social engineering campaigns could be used to deliver the malicious JPG files. The availability impact also suggests potential for denial-of-service conditions if the application or system crashes. The vulnerability could affect not only individual workstations but also shared environments and render farms if malicious files are introduced. This could lead to operational downtime and financial losses. European organizations with stringent data protection regulations (e.g., GDPR) may face compliance risks if breaches occur due to this vulnerability.

Mitigation Recommendations

1. Monitor Autodesk’s official channels for patches addressing CVE-2025-11795 and apply them immediately upon release. 2. Until patches are available, restrict the import and opening of JPG files from untrusted or unknown sources within Autodesk 3ds Max environments. 3. Implement application whitelisting and sandboxing to limit the execution context of 3ds Max and contain potential exploits. 4. Educate users about the risks of opening unsolicited or suspicious image files and enforce strict file handling policies. 5. Use endpoint detection and response (EDR) tools to monitor for anomalous behavior indicative of exploitation attempts. 6. Employ network segmentation to isolate critical design and rendering infrastructure from general user environments. 7. Regularly back up critical project files and maintain offline copies to reduce impact from potential compromise. 8. Review and harden user privileges to minimize the impact scope if exploitation occurs. 9. Consider disabling automatic preview or parsing of image files within 3ds Max if configurable. 10. Conduct threat hunting exercises focused on detecting attempts to exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-10-15T14:19:28.654Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914b570be619665a23e09dd

Added to database: 11/12/2025, 4:27:28 PM

Last enriched: 11/12/2025, 4:32:12 PM

Last updated: 11/12/2025, 5:37:47 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats