CVE-2025-6635: CWE-125 Out-of-Bounds Read in Autodesk Shared Components
A maliciously crafted PRT file, when linked or imported into certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
AI Analysis
Technical Summary
CVE-2025-6635 is a high-severity vulnerability classified as CWE-125, an Out-of-Bounds Read, affecting Autodesk Shared Components version 2026.2. This vulnerability arises when a specially crafted PRT (part) file is linked or imported into certain Autodesk products that utilize these shared components. The malformed PRT file triggers an out-of-bounds read condition, allowing an attacker to read memory beyond the intended buffer boundaries. The consequences of this flaw include application crashes (denial of service), unauthorized disclosure of sensitive data residing in adjacent memory, or potentially arbitrary code execution within the context of the affected process. The CVSS v3.1 base score is 7.8, reflecting high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction required (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No public exploits are currently known, and no patches have been linked yet. The vulnerability was reserved in June 2025 and published in late July 2025, indicating recent discovery and disclosure. The lack of patches suggests that affected organizations must proactively implement mitigations until an official fix is released. This vulnerability is critical for environments where Autodesk products are used to process PRT files, especially in engineering, manufacturing, and design sectors.
Potential Impact
For European organizations, the impact of CVE-2025-6635 can be significant, particularly for those in industries relying heavily on Autodesk software, such as automotive, aerospace, manufacturing, and construction. Exploitation could lead to unauthorized access to sensitive intellectual property or design data, potentially resulting in industrial espionage or sabotage. The ability to execute arbitrary code elevates the risk to full system compromise, which could disrupt business operations, cause data breaches, and damage reputations. Given the local attack vector and requirement for user interaction, the threat may arise from malicious insiders or targeted phishing campaigns delivering crafted PRT files. The high impact on confidentiality, integrity, and availability means that critical design and engineering workflows could be interrupted, delaying projects and causing financial losses. Additionally, regulatory compliance risks exist if sensitive data is exposed, especially under GDPR mandates. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation as attackers develop proof-of-concept code.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation approach: 1) Restrict and monitor the sources of PRT files imported into Autodesk products, enforcing strict validation and scanning for anomalies before use. 2) Educate users about the risks of opening untrusted or unsolicited PRT files, emphasizing cautious handling and verification. 3) Employ application whitelisting and sandboxing techniques to limit the impact of potential exploitation, isolating Autodesk processes where feasible. 4) Maintain up-to-date backups of critical design data to enable recovery from crashes or compromises. 5) Monitor system and application logs for unusual crashes or behavior indicative of exploitation attempts. 6) Engage with Autodesk support channels to obtain patches or workarounds as soon as they become available and prioritize timely deployment. 7) Consider network segmentation to limit lateral movement if a compromise occurs. These targeted measures go beyond generic advice by focusing on the specific attack vector (malicious PRT files) and the operational context of Autodesk products.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Czech Republic
CVE-2025-6635: CWE-125 Out-of-Bounds Read in Autodesk Shared Components
Description
A maliciously crafted PRT file, when linked or imported into certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
AI-Powered Analysis
Technical Analysis
CVE-2025-6635 is a high-severity vulnerability classified as CWE-125, an Out-of-Bounds Read, affecting Autodesk Shared Components version 2026.2. This vulnerability arises when a specially crafted PRT (part) file is linked or imported into certain Autodesk products that utilize these shared components. The malformed PRT file triggers an out-of-bounds read condition, allowing an attacker to read memory beyond the intended buffer boundaries. The consequences of this flaw include application crashes (denial of service), unauthorized disclosure of sensitive data residing in adjacent memory, or potentially arbitrary code execution within the context of the affected process. The CVSS v3.1 base score is 7.8, reflecting high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction required (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No public exploits are currently known, and no patches have been linked yet. The vulnerability was reserved in June 2025 and published in late July 2025, indicating recent discovery and disclosure. The lack of patches suggests that affected organizations must proactively implement mitigations until an official fix is released. This vulnerability is critical for environments where Autodesk products are used to process PRT files, especially in engineering, manufacturing, and design sectors.
Potential Impact
For European organizations, the impact of CVE-2025-6635 can be significant, particularly for those in industries relying heavily on Autodesk software, such as automotive, aerospace, manufacturing, and construction. Exploitation could lead to unauthorized access to sensitive intellectual property or design data, potentially resulting in industrial espionage or sabotage. The ability to execute arbitrary code elevates the risk to full system compromise, which could disrupt business operations, cause data breaches, and damage reputations. Given the local attack vector and requirement for user interaction, the threat may arise from malicious insiders or targeted phishing campaigns delivering crafted PRT files. The high impact on confidentiality, integrity, and availability means that critical design and engineering workflows could be interrupted, delaying projects and causing financial losses. Additionally, regulatory compliance risks exist if sensitive data is exposed, especially under GDPR mandates. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation as attackers develop proof-of-concept code.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation approach: 1) Restrict and monitor the sources of PRT files imported into Autodesk products, enforcing strict validation and scanning for anomalies before use. 2) Educate users about the risks of opening untrusted or unsolicited PRT files, emphasizing cautious handling and verification. 3) Employ application whitelisting and sandboxing techniques to limit the impact of potential exploitation, isolating Autodesk processes where feasible. 4) Maintain up-to-date backups of critical design data to enable recovery from crashes or compromises. 5) Monitor system and application logs for unusual crashes or behavior indicative of exploitation attempts. 6) Engage with Autodesk support channels to obtain patches or workarounds as soon as they become available and prioritize timely deployment. 7) Consider network segmentation to limit lateral movement if a compromise occurs. These targeted measures go beyond generic advice by focusing on the specific attack vector (malicious PRT files) and the operational context of Autodesk products.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- autodesk
- Date Reserved
- 2025-06-25T13:44:26.482Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68890cc5ad5a09ad008f5d1d
Added to database: 7/29/2025, 6:02:45 PM
Last enriched: 8/20/2025, 12:40:37 AM
Last updated: 8/30/2025, 4:18:04 AM
Views: 19
Related Threats
CVE-2025-57052: n/a
CriticalCVE-2025-20336: Exposure of Sensitive Information to an Unauthorized Actor in Cisco Cisco Session Initiation Protocol (SIP) Software
MediumCVE-2025-20335: Improper Access Control in Cisco Cisco Session Initiation Protocol (SIP) Software
MediumCVE-2025-20330: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Cisco Cisco Unified Communications Manager IM and Presence Service
MediumCVE-2025-20328: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Cisco Cisco Webex Meetings
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.