Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9457: CWE-122 Heap-based Buffer Overflow in Autodesk Shared Components

0
High
VulnerabilityCVE-2025-9457cvecve-2025-9457cwe-122
Published: Mon Dec 15 2025 (12/15/2025, 23:37:20 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Shared Components

Description

A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:00:52 UTC

Technical Analysis

CVE-2025-9457 is a heap-based buffer overflow vulnerability classified under CWE-122, affecting Autodesk Shared Components version 2026.0. The flaw occurs when the software parses a maliciously crafted PRT file, which leads to memory corruption. This memory corruption can be exploited by an attacker to execute arbitrary code within the context of the current process, potentially allowing full compromise of the affected system. The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R) such as opening or importing the malicious PRT file. The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits have been reported in the wild yet, and no patches have been released at the time of publication. Autodesk Shared Components are widely used across Autodesk’s suite of design and engineering software, making this vulnerability relevant to many users in industries such as manufacturing, architecture, and product design. The vulnerability’s exploitation could lead to unauthorized code execution, data theft, or disruption of critical workflows. The lack of available patches increases the urgency for organizations to implement interim mitigations and monitor for suspicious activity related to Autodesk processes.

Potential Impact

The potential impact of CVE-2025-9457 is significant for organizations using Autodesk Shared Components, especially in sectors relying on CAD and design software. Successful exploitation can lead to arbitrary code execution, allowing attackers to gain control over affected systems, steal sensitive intellectual property, manipulate design files, or disrupt production workflows. This can result in loss of confidentiality, integrity, and availability of critical data and systems. The requirement for user interaction means social engineering or phishing could be used to deliver the malicious PRT file, increasing the attack surface. Organizations with large design teams or those sharing PRT files across networks are particularly vulnerable. The absence of patches means attackers could develop exploits over time, increasing risk. Additionally, compromised systems could serve as footholds for lateral movement within corporate networks, potentially impacting broader enterprise infrastructure.

Mitigation Recommendations

1. Restrict the opening and importing of PRT files from untrusted or unknown sources until a patch is available. 2. Implement strict application whitelisting to limit execution of unauthorized code within Autodesk environments. 3. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to Autodesk processes, such as unexpected memory usage or code injection attempts. 4. Educate users on the risks of opening files from unverified sources and enforce policies for secure file handling. 5. Use network segmentation to isolate design workstations from critical infrastructure to limit lateral movement in case of compromise. 6. Regularly back up critical design data and verify backup integrity to enable recovery from potential attacks. 7. Monitor vendor communications closely for patches or updates addressing this vulnerability and apply them promptly once available. 8. Consider deploying sandbox environments to open and analyze suspicious PRT files safely before use in production.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-08-25T14:12:52.324Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69409d9cd9bcdf3f3d09c719

Added to database: 12/15/2025, 11:45:32 PM

Last enriched: 2/27/2026, 7:00:52 AM

Last updated: 3/24/2026, 12:10:03 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses