Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0874: CWE-787 Out-of-bounds Write in Autodesk Shared Components

0
High
VulnerabilityCVE-2026-0874cvecve-2026-0874cwe-787
Published: Wed Feb 18 2026 (02/18/2026, 19:38:32 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Shared Components

Description

CVE-2026-0874 is a high-severity out-of-bounds write vulnerability in Autodesk Shared Components triggered by parsing a maliciously crafted CATPART file. Exploitation can lead to application crashes, data corruption, or arbitrary code execution within the context of the affected process. The vulnerability affects Autodesk Shared Components version 2026. 5 and requires user interaction to open a malicious file. No known exploits are currently in the wild. The CVSS score is 7. 8, reflecting high impact on confidentiality, integrity, and availability with low attack complexity but requiring user interaction. European organizations using Autodesk CAD products that rely on these shared components are at risk, especially in industries like manufacturing, engineering, and design. Mitigations include restricting file sources, applying patches once available, employing application whitelisting, and monitoring for anomalous process behavior. Countries with strong manufacturing and engineering sectors such as Germany, France, Italy, and the UK are most likely to be affected due to higher Autodesk product usage and strategic importance.

AI-Powered Analysis

AILast updated: 02/18/2026, 20:40:57 UTC

Technical Analysis

CVE-2026-0874 is an out-of-bounds write vulnerability classified under CWE-787 found in Autodesk Shared Components version 2026.5. This vulnerability arises when a specially crafted CATPART file is parsed by Autodesk products utilizing these shared components. The flaw allows an attacker to write outside the bounds of allocated memory, potentially leading to memory corruption. Consequences of exploitation include application crashes, data corruption, or execution of arbitrary code within the context of the affected process. The attack vector requires local access with user interaction, as the victim must open or import the malicious CATPART file. The CVSS 3.1 base score of 7.8 indicates high severity with impacts on confidentiality, integrity, and availability. The attack complexity is low, no privileges are required, but user interaction is necessary. Currently, there are no known exploits in the wild, and no patches have been published yet. Autodesk Shared Components are widely used across Autodesk CAD and design software, making this vulnerability relevant to many users in design, engineering, and manufacturing sectors. The vulnerability's exploitation could allow attackers to execute arbitrary code, potentially leading to system compromise or lateral movement within a network if the affected software is used in critical workflows.

Potential Impact

For European organizations, the impact of CVE-2026-0874 could be significant, particularly in sectors heavily reliant on Autodesk CAD software such as automotive, aerospace, industrial manufacturing, and architecture. Successful exploitation could result in unauthorized code execution, leading to intellectual property theft, disruption of design workflows, or insertion of malicious modifications into design files. Data corruption or application crashes could cause operational downtime and loss of productivity. Given the high confidentiality and integrity impact, sensitive design data could be exposed or altered, affecting competitive advantage and compliance with data protection regulations such as GDPR. The requirement for user interaction limits mass exploitation but targeted spear-phishing or supply chain attacks embedding malicious CATPART files could pose a serious threat. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score demands urgent attention to prevent potential future attacks.

Mitigation Recommendations

1. Restrict the sources of CATPART files by enforcing strict file origin policies and educating users to avoid opening files from untrusted or unknown sources. 2. Implement application whitelisting and sandboxing for Autodesk products to limit the impact of potential exploitation. 3. Monitor and log application crashes and anomalous behavior in Autodesk software to detect early signs of exploitation attempts. 4. Deploy endpoint detection and response (EDR) solutions capable of identifying suspicious memory corruption or code execution patterns. 5. Once Autodesk releases patches or updates addressing CVE-2026-0874, prioritize immediate deployment across all affected systems. 6. Conduct user awareness training focusing on the risks of opening unsolicited CAD files and recognizing phishing attempts. 7. Consider network segmentation to isolate systems running Autodesk software, reducing lateral movement risk if compromise occurs. 8. Regularly back up critical design data and verify integrity to enable recovery from data corruption or ransomware scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2026-01-13T12:36:42.762Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699620676aea4a407add8675

Added to database: 2/18/2026, 8:26:15 PM

Last enriched: 2/18/2026, 8:40:57 PM

Last updated: 2/18/2026, 10:46:50 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats