Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9457: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk Shared Components

0
High
VulnerabilityCVE-2025-9457cvecve-2025-9457cwe-120
Published: Mon Dec 15 2025 (12/15/2025, 23:37:20 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Shared Components

Description

A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 12/16/2025, 00:02:09 UTC

Technical Analysis

CVE-2025-9457 is a classic buffer overflow vulnerability (CWE-120) identified in Autodesk Shared Components version 2026.0. The flaw occurs due to a lack of proper bounds checking when parsing PRT files, which are proprietary part files used in Autodesk's CAD software suite. A maliciously crafted PRT file can trigger memory corruption by overflowing a buffer, potentially overwriting critical memory regions. This memory corruption can be leveraged by an attacker to execute arbitrary code with the privileges of the current user process. The vulnerability is local in nature, requiring the attacker to have the ability to deliver and open a malicious PRT file, thus necessitating user interaction. The CVSS 3.1 base score of 7.8 reflects high severity, with high impact on confidentiality, integrity, and availability. The attack complexity is low, no privileges are required, but user interaction is mandatory. No public exploits are known at this time, but the vulnerability poses a significant risk due to the widespread use of Autodesk products in professional environments. The vulnerability was reserved in August 2025 and published in December 2025, indicating a relatively recent discovery. Autodesk has not yet released patches, so mitigation currently relies on defensive controls and cautious handling of PRT files.

Potential Impact

The vulnerability allows arbitrary code execution, which can lead to full compromise of affected systems running Autodesk Shared Components 2026.0. For European organizations, particularly those in manufacturing, automotive, aerospace, architecture, and engineering sectors that heavily rely on Autodesk CAD tools, this could result in theft of intellectual property, sabotage of design files, disruption of production workflows, and potential ransomware deployment. The high impact on confidentiality, integrity, and availability means sensitive design data could be exposed or altered, causing financial and reputational damage. Additionally, compromised systems could serve as footholds for lateral movement within corporate networks. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where files are shared frequently. The absence of known exploits in the wild provides a window for proactive mitigation before attackers develop weaponized payloads.

Mitigation Recommendations

1. Monitor Autodesk's official channels for patches addressing CVE-2025-9457 and apply them immediately upon release. 2. Implement strict file handling policies to restrict the opening of PRT files from untrusted or unknown sources. 3. Employ application whitelisting to limit execution of unauthorized binaries and scripts that could be used in exploitation. 4. Use sandboxing or isolated environments for opening PRT files, especially those received from external parties. 5. Educate users about the risks of opening unsolicited or suspicious files and enforce security awareness training. 6. Deploy endpoint detection and response (EDR) solutions capable of detecting anomalous behavior indicative of exploitation attempts. 7. Regularly audit and restrict local user permissions to minimize the impact of potential code execution. 8. Network segmentation to limit lateral movement if a system is compromised. 9. Maintain up-to-date backups of critical design data to enable recovery in case of data corruption or ransomware.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-08-25T14:12:52.324Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69409d9cd9bcdf3f3d09c719

Added to database: 12/15/2025, 11:45:32 PM

Last enriched: 12/16/2025, 12:02:09 AM

Last updated: 12/18/2025, 11:40:55 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats