Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11797: CWE-416 Use After Free in Autodesk 3ds Max

0
High
VulnerabilityCVE-2025-11797cvecve-2025-11797cwe-416
Published: Wed Nov 12 2025 (11/12/2025, 16:24:50 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: 3ds Max

Description

A maliciously crafted DWG file, when parsed through Autodesk 3ds Max, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 11/19/2025, 16:54:32 UTC

Technical Analysis

CVE-2025-11797 is a Use-After-Free (CWE-416) vulnerability identified in Autodesk 3ds Max version 2026. The flaw arises when the software parses a specially crafted DWG file, a common format for CAD drawings. The vulnerability allows an attacker to manipulate memory management within the application, leading to a Use-After-Free condition. This can cause the application to crash, potentially exposing sensitive data in memory or enabling the execution of arbitrary code with the privileges of the current user process. Exploitation requires the victim to open or process a malicious DWG file, implying user interaction is necessary. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The vulnerability affects confidentiality, integrity, and availability (all rated high impact). Although no public exploits are known at this time, the vulnerability’s nature and impact make it a significant risk for users of Autodesk 3ds Max, particularly those handling untrusted DWG files. The lack of available patches at publication suggests organizations must rely on interim mitigations until official fixes are released.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to industries relying on Autodesk 3ds Max, including architecture, engineering, construction, and media production. Successful exploitation can lead to application crashes disrupting workflows, unauthorized disclosure of sensitive design data, and potential full compromise of the user’s session or system if arbitrary code execution is achieved. This could result in intellectual property theft, project delays, and reputational damage. Given the high confidentiality and integrity impact, organizations handling sensitive or proprietary designs are particularly vulnerable. The requirement for user interaction and local access somewhat limits remote exploitation but does not eliminate risk, especially in environments where DWG files are shared or downloaded from external sources. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score indicates that once exploits emerge, the threat could escalate rapidly.

Mitigation Recommendations

Until Autodesk releases an official patch, European organizations should implement strict controls on DWG file handling, including restricting file sources to trusted vendors and scanning all incoming files with advanced malware detection tools. Employ application sandboxing or containerization to isolate Autodesk 3ds Max processes, limiting potential damage from exploitation. Enforce the principle of least privilege for users running 3ds Max to minimize impact if code execution occurs. Monitor application and system logs for unusual crashes or behavior indicative of exploitation attempts. Educate users about the risks of opening untrusted DWG files and implement network segmentation to reduce lateral movement in case of compromise. Once patches become available, prioritize immediate deployment across all affected systems. Additionally, consider using endpoint detection and response (EDR) solutions capable of detecting exploitation techniques related to Use-After-Free vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-10-15T14:19:31.057Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914b570be619665a23e09e0

Added to database: 11/12/2025, 4:27:28 PM

Last enriched: 11/19/2025, 4:54:32 PM

Last updated: 12/27/2025, 11:21:55 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats