Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11797: CWE-416 Use After Free in Autodesk 3ds Max

0
High
VulnerabilityCVE-2025-11797cvecve-2025-11797cwe-416
Published: Wed Nov 12 2025 (11/12/2025, 16:24:50 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: 3ds Max

Description

A maliciously crafted DWG file, when parsed through Autodesk 3ds Max, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 11/12/2025, 16:32:37 UTC

Technical Analysis

CVE-2025-11797 is a Use-After-Free vulnerability classified under CWE-416 found in Autodesk 3ds Max 2026. The flaw arises when the software parses a specially crafted DWG file, leading to improper memory management where freed memory is accessed again. This memory corruption can be exploited by an attacker to cause a denial of service (application crash), leak sensitive information from memory, or execute arbitrary code with the privileges of the running process. The vulnerability requires the victim to open or otherwise process a malicious DWG file, implying user interaction is necessary. No privileges are required to trigger the flaw, but the attacker must have local access or deliver the malicious file through social engineering or compromised file sharing. The CVSS v3.1 score is 7.8 (high), reflecting the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. Although no known exploits are publicly reported, the vulnerability poses a significant risk due to the widespread use of Autodesk 3ds Max in professional design and modeling environments. The absence of a patch at the time of disclosure increases the urgency for defensive measures. The vulnerability affects version 2026 specifically, indicating it is a recent introduction or regression. Attackers could leverage this to compromise workstations, steal intellectual property, or disrupt critical design workflows.

Potential Impact

For European organizations, the impact of CVE-2025-11797 can be substantial, especially in sectors relying heavily on Autodesk 3ds Max such as architecture, engineering, construction, media production, and manufacturing design. Exploitation could lead to unauthorized disclosure of sensitive design data, intellectual property theft, or disruption of critical design and modeling operations. This could result in financial losses, reputational damage, and delays in project delivery. The ability to execute arbitrary code also raises the risk of broader network compromise if attackers pivot from the affected host. Given the high confidentiality and integrity impact, organizations handling sensitive or proprietary designs are particularly vulnerable. The requirement for user interaction means phishing or social engineering campaigns could be used to deliver the malicious DWG files, increasing the attack surface. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure.

Mitigation Recommendations

1. Apply official patches from Autodesk as soon as they become available to remediate the vulnerability. 2. Until patches are released, restrict the opening of DWG files from untrusted or unknown sources. Implement strict file validation and scanning for malicious content. 3. Employ application whitelisting and sandboxing to limit the impact of potential exploitation and prevent unauthorized code execution. 4. Educate users on the risks of opening unsolicited or suspicious DWG files, emphasizing caution with email attachments and file downloads. 5. Monitor Autodesk 3ds Max processes for abnormal behavior such as crashes or unexpected network activity that could indicate exploitation attempts. 6. Use endpoint detection and response (EDR) tools to detect and respond to suspicious activities related to this vulnerability. 7. Limit user privileges on workstations running 3ds Max to reduce the potential impact of code execution. 8. Maintain regular backups of critical design files to mitigate data loss from crashes or attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-10-15T14:19:31.057Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914b570be619665a23e09e0

Added to database: 11/12/2025, 4:27:28 PM

Last enriched: 11/12/2025, 4:32:37 PM

Last updated: 11/12/2025, 5:29:21 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats