Skip to main content

CVE-2025-7675: CWE-787 Out-of-Bounds Write in Autodesk Shared Components

High
VulnerabilityCVE-2025-7675cvecve-2025-7675cwe-787
Published: Tue Jul 29 2025 (07/29/2025, 17:57:36 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Shared Components

Description

A maliciously crafted 3DM file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 08/20/2025, 00:41:32 UTC

Technical Analysis

CVE-2025-7675 is a high-severity vulnerability classified as CWE-787 (Out-of-Bounds Write) affecting Autodesk Shared Components, specifically version 2026.2. The vulnerability arises when a maliciously crafted 3DM file is parsed by certain Autodesk products that rely on these shared components. An out-of-bounds write occurs when the software writes data outside the boundaries of allocated memory buffers, which can corrupt memory, cause application crashes, or enable arbitrary code execution within the context of the current process. Exploitation requires that a user open or otherwise process a malicious 3DM file, which triggers the vulnerable parsing routine. The CVSS 3.1 base score is 7.8, indicating high severity, with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The impact on confidentiality, integrity, and availability is high, meaning successful exploitation can lead to full compromise of the affected application and potentially the underlying system. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting this is a recently disclosed vulnerability. Autodesk Shared Components are widely used across Autodesk's suite of design and engineering software, making this a significant risk for users who handle 3DM files, a common format in 3D modeling and CAD workflows.

Potential Impact

For European organizations, especially those in architecture, engineering, construction, manufacturing, and design sectors that heavily rely on Autodesk products, this vulnerability poses a substantial risk. Successful exploitation could lead to unauthorized code execution, enabling attackers to deploy malware, steal intellectual property, or disrupt critical design workflows. Given the high confidentiality and integrity impact, sensitive design data could be exfiltrated or altered, potentially causing financial loss, reputational damage, and compliance issues under regulations like GDPR. The availability impact means that critical design applications could be crashed or rendered unusable, delaying projects and affecting business continuity. Since exploitation requires user interaction (opening a malicious 3DM file), targeted phishing or social engineering campaigns could be used to deliver the payload. The lack of patches at the time of disclosure increases the window of exposure for European organizations until Autodesk releases updates.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation approach: 1) Immediately restrict or monitor the handling of 3DM files from untrusted sources, including disabling automatic opening or previewing of such files in Autodesk products until patches are available. 2) Educate users about the risks of opening unsolicited or suspicious 3DM files, emphasizing cautious handling of email attachments and downloads. 3) Employ endpoint protection solutions capable of detecting anomalous behaviors or memory corruption attempts associated with out-of-bounds writes. 4) Use application whitelisting and sandboxing techniques to limit the impact of potential exploitation. 5) Maintain up-to-date backups of critical design data to enable recovery in case of corruption or ransomware deployment. 6) Monitor Autodesk’s official channels closely for patch releases and apply updates promptly once available. 7) Consider network segmentation to isolate systems running Autodesk software, reducing lateral movement opportunities for attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
autodesk
Date Reserved
2025-07-15T12:31:56.589Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68890cc5ad5a09ad008f5d07

Added to database: 7/29/2025, 6:02:45 PM

Last enriched: 8/20/2025, 12:41:32 AM

Last updated: 8/31/2025, 10:40:31 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats