Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9452: CWE-787 Out-of-bounds Write in Autodesk Shared Components

0
High
VulnerabilityCVE-2025-9452cvecve-2025-9452cwe-787
Published: Mon Dec 15 2025 (12/15/2025, 23:32:39 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Shared Components

Description

A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 01/22/2026, 20:01:52 UTC

Technical Analysis

CVE-2025-9452 is an out-of-bounds write vulnerability classified under CWE-787, affecting Autodesk Shared Components version 2026.0. The vulnerability arises when the software parses a maliciously crafted SLDPRT file, a common file format used by Autodesk for 3D part models. This parsing error leads to memory corruption, specifically an out-of-bounds write, which can overwrite adjacent memory regions. Such memory corruption can be exploited by an attacker to execute arbitrary code within the context of the Autodesk process, potentially allowing full control over the affected application. The vulnerability requires the victim to open or import the malicious SLDPRT file, meaning user interaction is necessary. No prior privileges are required, but the attack vector is local (AV:L), indicating the attacker must have access to deliver the malicious file to the user. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution can lead to data theft, manipulation, or denial of service. Autodesk has not yet released a patch, and no known exploits are reported in the wild as of the publication date. However, the high CVSS score (7.8) and the nature of the vulnerability make it a significant risk, especially for organizations relying heavily on Autodesk products for design and engineering workflows.

Potential Impact

For European organizations, the impact of CVE-2025-9452 is substantial, particularly in sectors such as manufacturing, automotive, aerospace, architecture, and engineering where Autodesk software is widely used. Exploitation could lead to unauthorized code execution, enabling attackers to steal intellectual property, disrupt design processes, or implant persistent malware. This could result in financial losses, reputational damage, and operational downtime. Given the vulnerability requires user interaction, phishing or social engineering campaigns could be leveraged to deliver malicious SLDPRT files. The high impact on confidentiality and integrity is critical for organizations handling sensitive design data or proprietary models. Additionally, disruption of design workflows could delay project timelines and affect supply chains. The absence of known exploits currently provides a window for proactive mitigation, but the risk of future exploitation remains significant.

Mitigation Recommendations

1. Monitor Autodesk’s official channels for patches addressing CVE-2025-9452 and apply them immediately upon release. 2. Implement strict controls on file sources by restricting or scanning SLDPRT files received via email or downloaded from untrusted locations. 3. Employ application whitelisting to limit execution of unauthorized or suspicious files within Autodesk environments. 4. Use sandboxing or containerization techniques to isolate Autodesk applications, reducing the impact of potential exploitation. 5. Train users to recognize phishing attempts and suspicious file attachments, emphasizing caution with unsolicited SLDPRT files. 6. Maintain up-to-date endpoint detection and response (EDR) solutions capable of detecting anomalous behavior indicative of exploitation attempts. 7. Conduct regular backups of critical design data to enable recovery in case of compromise. 8. Review and tighten access controls to limit exposure of Autodesk software to only necessary users.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-08-25T14:12:49.013Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69409d9ed9bcdf3f3d09c749

Added to database: 12/15/2025, 11:45:34 PM

Last enriched: 1/22/2026, 8:01:52 PM

Last updated: 2/7/2026, 7:10:41 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats