Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9452: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk Shared Components

0
High
VulnerabilityCVE-2025-9452cvecve-2025-9452cwe-120
Published: Mon Dec 15 2025 (12/15/2025, 23:32:39 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Shared Components

Description

A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 12/16/2025, 00:01:03 UTC

Technical Analysis

CVE-2025-9452 is a classic buffer overflow vulnerability (CWE-120) identified in Autodesk Shared Components version 2026.0. The flaw occurs due to a lack of proper bounds checking when parsing SLDPRT files, which are proprietary 3D part files used in Autodesk CAD products. A specially crafted SLDPRT file can trigger memory corruption by overflowing a buffer during the file parsing process. This memory corruption can be exploited by an attacker to execute arbitrary code within the context of the current process, potentially leading to full compromise of the affected application. The vulnerability has a CVSS v3.1 score of 7.8, indicating high severity, with an attack vector classified as local (AV:L), meaning the attacker must have local access to the system. No privileges are required (PR:N), but user interaction is necessary (UI:R), such as opening or importing the malicious file. The vulnerability affects Autodesk Shared Components 2026.0, a core library used by multiple Autodesk products, which increases the attack surface. Although no known exploits have been reported in the wild, the potential for arbitrary code execution makes this a critical concern for organizations relying on Autodesk software for design and engineering tasks. No patches or fixes have been published yet, so users remain vulnerable. The vulnerability was reserved in August 2025 and published in December 2025, indicating a recent discovery.

Potential Impact

For European organizations, especially those in manufacturing, engineering, architecture, and product design sectors that heavily rely on Autodesk software, this vulnerability poses a significant risk. Exploitation could lead to unauthorized code execution, resulting in data theft, intellectual property compromise, or disruption of critical design workflows. Given the local attack vector and requirement for user interaction, the threat is more likely to arise from targeted attacks or insider threats where malicious files are introduced into the environment. The high confidentiality, integrity, and availability impacts could affect sensitive design files and project timelines, potentially causing financial losses and reputational damage. Additionally, compromised systems could serve as footholds for further lateral movement within corporate networks. The lack of patches increases exposure duration, emphasizing the need for proactive mitigation.

Mitigation Recommendations

1. Restrict the sources of SLDPRT files by enforcing strict file acceptance policies and validating file origins before opening or importing them. 2. Implement application whitelisting and sandboxing for Autodesk products to limit the impact of potential exploitation. 3. Educate users on the risks of opening files from untrusted or unknown sources to reduce the likelihood of user interaction with malicious files. 4. Monitor system and application logs for unusual behavior indicative of exploitation attempts, such as crashes or unexpected process activity. 5. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous memory corruption or code injection activities. 6. Coordinate with Autodesk for timely patch deployment once available and apply updates promptly. 7. Consider network segmentation to isolate design workstations and limit lateral movement if compromise occurs. 8. Use file integrity monitoring on critical design files and shared components to detect unauthorized changes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-08-25T14:12:49.013Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69409d9ed9bcdf3f3d09c749

Added to database: 12/15/2025, 11:45:34 PM

Last enriched: 12/16/2025, 12:01:03 AM

Last updated: 12/16/2025, 5:52:40 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats