Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4605: CWE-789 Memory Allocation with Excessive Size Value in Autodesk USD for Maya

0
Medium
VulnerabilityCVE-2025-4605cvecve-2025-4605cwe-789
Published: Wed Jun 11 2025 (06/11/2025, 13:53:51 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: USD for Maya

Description

A maliciously crafted .usdc file, when loaded through Autodesk Maya, can force an uncontrolled memory allocation vulnerability. A malicious actor may leverage this vulnerability to cause a denial-of-service (DoS), or cause data corruption.

AI-Powered Analysis

AILast updated: 08/23/2025, 01:00:32 UTC

Technical Analysis

CVE-2025-4605 is a vulnerability identified in Autodesk's USD for Maya, specifically version 0.31.0. The issue stems from improper handling of memory allocation when processing maliciously crafted .usdc files. The vulnerability is categorized under CWE-789, which refers to memory allocation with an excessive size value. When a specially crafted .usdc file is loaded into Autodesk Maya, the software attempts to allocate an uncontrolled amount of memory. This can lead to denial-of-service (DoS) conditions by exhausting system resources or potentially cause data corruption due to memory mismanagement. The vulnerability requires local access (attack vector: local) and user interaction (loading the malicious file), but does not require privileges or authentication. The CVSS v3.1 base score is 6.6, indicating a medium severity level. The impact on confidentiality and integrity is low, but availability impact is high due to potential DoS. No known exploits are currently reported in the wild, and no patches have been released as of the publication date (June 11, 2025).

Potential Impact

For European organizations, especially those involved in digital content creation, animation, visual effects, or any industry relying on Autodesk Maya and its USD plugin, this vulnerability poses a risk of operational disruption. A successful exploitation could cause Maya to crash or become unresponsive, leading to loss of productivity and potential data corruption in project files. While the confidentiality and integrity impacts are low, the availability impact could affect project timelines and business continuity. Organizations with workflows that involve importing .usdc files from external or untrusted sources are particularly at risk. Given the creative and media sectors' importance in Europe, disruptions could have economic consequences. Furthermore, if exploited in a targeted manner, it could be used as a vector for sabotage or to disrupt collaborative projects.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement strict file handling policies, including validating and sanitizing all .usdc files before loading them into Maya. Restricting the import of .usdc files to trusted sources only is critical. Employ sandboxing or isolated environments for testing untrusted files to prevent system-wide impact. Monitoring application logs for unusual memory allocation patterns or crashes can help detect exploitation attempts early. Since no patch is currently available, organizations should consider disabling the USD plugin in Maya if it is not essential to their workflows. Additionally, educating users about the risks of opening unverified .usdc files and enforcing least privilege principles for user accounts can reduce exposure. Regular backups of project data will help recover from potential data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
autodesk
Date Reserved
2025-05-12T18:36:16.531Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68498e0523110031d4101335

Added to database: 6/11/2025, 2:09:09 PM

Last enriched: 8/23/2025, 1:00:32 AM

Last updated: 10/7/2025, 1:46:44 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats