Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9458: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk Shared Components

0
High
VulnerabilityCVE-2025-9458cvecve-2025-9458cwe-120
Published: Fri Nov 07 2025 (11/07/2025, 18:01:48 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Shared Components

Description

A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 11/14/2025, 19:08:45 UTC

Technical Analysis

CVE-2025-9458 is a classic buffer overflow vulnerability categorized under CWE-120, affecting Autodesk Shared Components version 2026.3. The vulnerability occurs due to a lack of proper bounds checking when parsing PRT files, which are proprietary file formats used by Autodesk products for 3D modeling and CAD data. A maliciously crafted PRT file can cause a buffer overflow, leading to memory corruption. This memory corruption can be exploited by an attacker to execute arbitrary code within the context of the current process, potentially allowing full control over the affected application. The attack vector is local, meaning the attacker must have access to the system and the ability to provide a malicious PRT file to the vulnerable component. User interaction is required to trigger the vulnerability, such as opening or importing the malicious file. The vulnerability does not require privileges or authentication, increasing its risk profile if an attacker can convince a user to open a malicious file. The CVSS v3.1 score of 7.8 reflects high severity, with high impact on confidentiality, integrity, and availability. No public exploits are known yet, but the vulnerability's nature and impact make it a significant threat to environments using Autodesk software for design and engineering tasks.

Potential Impact

For European organizations, especially those in manufacturing, engineering, architecture, and design sectors that rely heavily on Autodesk products, this vulnerability poses a significant risk. Successful exploitation could lead to arbitrary code execution, allowing attackers to compromise sensitive intellectual property, disrupt design workflows, or deploy further malware within corporate networks. The high impact on confidentiality, integrity, and availability means that critical design data could be stolen, altered, or destroyed. Given the local attack vector and requirement for user interaction, the threat is more pronounced in environments where users frequently exchange or open PRT files from external or untrusted sources. Disruption of Autodesk applications could also delay project timelines and cause financial losses. Additionally, compromised systems could serve as footholds for lateral movement within enterprise networks, amplifying the potential damage.

Mitigation Recommendations

Organizations should prioritize patching Autodesk Shared Components version 2026.3 as soon as a vendor patch becomes available. Until patches are released, implement strict controls on the handling and opening of PRT files, including restricting file sharing from untrusted sources and employing file scanning solutions that can detect malformed or suspicious PRT files. Educate users about the risks of opening files from unknown or untrusted origins. Employ application whitelisting and sandboxing techniques to limit the execution context of Autodesk applications. Monitor logs and network traffic for unusual behavior related to Autodesk software processes. Additionally, consider isolating design workstations from critical network segments to reduce the risk of lateral movement if exploitation occurs. Regularly review and update endpoint protection solutions to detect potential exploit attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-08-25T14:12:52.995Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690e35acf29beb96f88f84b3

Added to database: 11/7/2025, 6:08:44 PM

Last enriched: 11/14/2025, 7:08:45 PM

Last updated: 12/22/2025, 1:44:06 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats