Skip to main content

CVE-2025-5046: CWE-125 Out-of-Bounds Read in Autodesk AutoCAD

High
VulnerabilityCVE-2025-5046cvecve-2025-5046cwe-125
Published: Fri Aug 15 2025 (08/15/2025, 14:37:20 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: AutoCAD

Description

A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 09/26/2025, 00:22:01 UTC

Technical Analysis

CVE-2025-5046 is a high-severity vulnerability classified as CWE-125 (Out-of-Bounds Read) affecting multiple recent versions of Autodesk AutoCAD, specifically versions 2023 through 2026. The vulnerability arises when a maliciously crafted DGN file is linked or imported into AutoCAD. Due to improper bounds checking during the processing of these DGN files, an attacker can trigger an out-of-bounds read condition. This flaw can be exploited to cause the AutoCAD process to crash, potentially leading to denial of service. More critically, it can allow an attacker to read sensitive memory contents, which may include confidential project data or credentials. In the worst case, the vulnerability could be leveraged to execute arbitrary code within the context of the AutoCAD process, enabling full compromise of the affected system with the privileges of the user running AutoCAD. The CVSS v3.1 score of 7.8 reflects the high impact on confidentiality, integrity, and availability, with a local attack vector requiring low attack complexity, no privileges, but user interaction (importing or linking a malicious file). No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations should prioritize monitoring and mitigation efforts. The vulnerability affects a widely used CAD software critical to engineering, architecture, and construction industries, making it a significant concern for organizations relying on AutoCAD for design workflows.

Potential Impact

For European organizations, the impact of CVE-2025-5046 can be substantial, especially for those in sectors such as architecture, engineering, construction, manufacturing, and infrastructure development where AutoCAD is extensively used. Exploitation could lead to unauthorized disclosure of sensitive design documents, intellectual property theft, and disruption of critical design and planning operations. The ability to execute arbitrary code elevates the risk to full system compromise, potentially allowing attackers to move laterally within corporate networks, exfiltrate data, or deploy ransomware. Given the collaborative nature of design projects, a compromised AutoCAD environment could also serve as a vector for supply chain attacks affecting multiple partners. The requirement for user interaction (importing a malicious DGN file) means that targeted phishing or social engineering campaigns could be used to deliver the exploit. The lack of available patches increases the window of exposure, necessitating immediate risk management. The confidentiality and integrity of sensitive project data are paramount in European markets, where data protection regulations such as GDPR impose strict requirements on data handling and breach notification.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy beyond generic patching advice. First, restrict the import and linking of DGN files from untrusted or external sources by enforcing strict file validation policies and using sandboxed environments for file processing. Employ application whitelisting and endpoint detection and response (EDR) tools to monitor and block suspicious AutoCAD behaviors indicative of exploitation attempts. Educate users, especially CAD operators, on the risks of opening files from unknown origins and implement phishing awareness training to reduce the likelihood of social engineering attacks delivering malicious DGN files. Network segmentation should be used to isolate systems running AutoCAD from critical infrastructure and sensitive data repositories to limit lateral movement in case of compromise. Monitor AutoCAD process crashes and unusual memory access patterns as potential indicators of exploitation. Since no official patches are currently available, coordinate with Autodesk for timely updates and consider temporary use of alternative CAD tools or offline processing where feasible. Finally, maintain robust backup and incident response plans tailored to CAD environments to enable rapid recovery if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
autodesk
Date Reserved
2025-05-21T13:01:05.437Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689f4893ad5a09ad006dc68e

Added to database: 8/15/2025, 2:47:47 PM

Last enriched: 9/26/2025, 12:22:01 AM

Last updated: 9/27/2025, 12:10:06 AM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats