Skip to main content

CVE-2025-5046: CWE-125 Out-of-Bounds Read in Autodesk AutoCAD

High
VulnerabilityCVE-2025-5046cvecve-2025-5046cwe-125
Published: Fri Aug 15 2025 (08/15/2025, 14:37:20 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: AutoCAD

Description

A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 08/15/2025, 15:03:23 UTC

Technical Analysis

CVE-2025-5046 is a high-severity vulnerability identified in Autodesk AutoCAD 2026, classified as a CWE-125 Out-of-Bounds Read. This vulnerability arises when AutoCAD processes a maliciously crafted DGN file that is either linked or imported. The flaw allows an attacker to trigger an out-of-bounds read condition, which can lead to multiple adverse effects including application crashes, unauthorized reading of sensitive memory contents, or even arbitrary code execution within the context of the AutoCAD process. The vulnerability requires local access to the system (Attack Vector: Local) and low attack complexity, meaning an attacker with limited skills can exploit it. No privileges are required, but user interaction is necessary to open or import the malicious DGN file. The vulnerability impacts confidentiality, integrity, and availability, as it can disclose sensitive data, corrupt or manipulate application behavior, and cause denial of service through crashes. The CVSS v3.1 base score is 7.8, reflecting a high severity level. Currently, there are no known exploits in the wild, and no patches have been published yet. However, the potential for exploitation exists given the widespread use of AutoCAD in various industries. The vulnerability's exploitation could be leveraged by attackers to gain a foothold or escalate privileges within targeted environments.

Potential Impact

For European organizations, the impact of CVE-2025-5046 can be significant, especially for those in architecture, engineering, construction, manufacturing, and design sectors where AutoCAD is heavily utilized. Exploitation could lead to unauthorized disclosure of intellectual property or sensitive project data, potentially causing financial loss and reputational damage. The ability to execute arbitrary code could allow attackers to move laterally within corporate networks, compromising additional systems or deploying ransomware. Additionally, disruption caused by application crashes could delay critical projects and operational workflows. Given the high confidentiality and integrity impact, organizations handling sensitive infrastructure designs or proprietary information are particularly at risk. The requirement for user interaction means social engineering or phishing campaigns could be used to trick users into opening malicious files, increasing the attack surface. The absence of patches at the time of disclosure further elevates the risk until mitigations or updates are applied.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy beyond generic advice. First, enforce strict file handling policies to restrict the import or linking of DGN files from untrusted or unknown sources. Employ application whitelisting and sandboxing techniques to isolate AutoCAD processes and limit the impact of potential exploitation. Use endpoint detection and response (EDR) tools to monitor for anomalous behavior indicative of exploitation attempts, such as unexpected crashes or memory access violations. Conduct user awareness training focused on the risks of opening files from unverified sources and recognizing social engineering tactics. Until an official patch is released, consider deploying virtualized or containerized environments for AutoCAD usage to contain potential damage. Network segmentation should be applied to limit lateral movement if a compromise occurs. Regularly review and update incident response plans to include scenarios involving AutoCAD vulnerabilities. Finally, maintain close monitoring of Autodesk advisories for patch releases and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
autodesk
Date Reserved
2025-05-21T13:01:05.437Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689f4893ad5a09ad006dc68e

Added to database: 8/15/2025, 2:47:47 PM

Last enriched: 8/15/2025, 3:03:23 PM

Last updated: 8/15/2025, 3:03:23 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats