Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0875: CWE-787 Out-of-bounds Write in Autodesk Shared Components

0
High
VulnerabilityCVE-2026-0875cvecve-2026-0875cwe-787
Published: Wed Feb 18 2026 (02/18/2026, 19:39:27 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Shared Components

Description

CVE-2026-0875 is a high-severity out-of-bounds write vulnerability in Autodesk Shared Components affecting version 2026. 5. It is triggered by parsing a maliciously crafted MODEL file, potentially allowing an attacker to crash the application, corrupt data, or execute arbitrary code with user privileges. Exploitation requires local access and user interaction but no prior authentication. Although no known exploits are currently in the wild, the vulnerability poses significant risks to confidentiality, integrity, and availability of affected systems. European organizations using Autodesk products in design, engineering, or manufacturing sectors should prioritize patching once available. Mitigation includes restricting MODEL file sources, employing application whitelisting, and monitoring for anomalous application behavior. Countries with strong manufacturing and design industries, such as Germany, France, Italy, and the UK, are most likely to be impacted due to higher Autodesk adoption and strategic importance. The vulnerability’s CVSS score of 7. 8 reflects its high risk, primarily due to potential code execution and data compromise.

AI-Powered Analysis

AILast updated: 02/18/2026, 20:40:39 UTC

Technical Analysis

CVE-2026-0875 is an out-of-bounds write vulnerability classified under CWE-787 that affects Autodesk Shared Components version 2026.5. This vulnerability arises when a specially crafted MODEL file is parsed by certain Autodesk products, leading to memory corruption through writing outside the intended buffer boundaries. The consequence of this memory corruption can range from application crashes and data corruption to arbitrary code execution within the context of the current user process. The attack vector requires local access (AV:L) and user interaction (UI:R), but no privileges or authentication are necessary, meaning an attacker must trick a user into opening or processing a malicious MODEL file. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution could allow an attacker to steal sensitive design data, manipulate files, or disrupt operations. Although no public exploits are reported yet, the vulnerability’s high CVSS score (7.8) indicates a serious risk. Autodesk Shared Components are widely used in CAD and design workflows, making this vulnerability relevant to industries relying on Autodesk software for product design and engineering. The lack of an official patch at the time of disclosure necessitates immediate risk mitigation strategies. The vulnerability was reserved in January 2026 and published in February 2026, indicating recent discovery and disclosure.

Potential Impact

For European organizations, especially those in manufacturing, automotive, aerospace, and engineering sectors, this vulnerability poses a significant threat. Autodesk products are widely used in these industries for designing and modeling critical components and systems. Exploitation could lead to unauthorized code execution, resulting in theft or manipulation of intellectual property, disruption of design workflows, and potential sabotage of product integrity. Data corruption or application crashes could cause operational downtime, delaying projects and increasing costs. The confidentiality impact is high as sensitive design files could be exposed or altered. Integrity is compromised through potential unauthorized modifications, and availability is affected by crashes or denial of service. Given the reliance on Autodesk software in European industrial hubs, the vulnerability could have cascading effects on supply chains and innovation. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where users frequently exchange MODEL files. The absence of known exploits currently provides a window for proactive defense but also underscores the need for vigilance.

Mitigation Recommendations

Until an official patch is released by Autodesk, European organizations should implement several targeted mitigations. First, restrict the sources of MODEL files to trusted origins only, employing strict file validation and sandboxing where possible. Educate users about the risks of opening MODEL files from unverified sources and enforce policies to minimize user interaction with potentially malicious files. Employ application whitelisting and endpoint protection solutions capable of detecting anomalous behavior in Autodesk processes. Monitor logs and system behavior for signs of crashes or unexpected activity related to Autodesk Shared Components. Network segmentation can limit the spread of potential compromise. Additionally, consider using virtualized or isolated environments for opening untrusted MODEL files to contain any exploitation attempts. Once Autodesk releases a patch, prioritize its deployment across all affected systems. Maintain up-to-date backups of critical design data to enable recovery from corruption or ransomware scenarios. Finally, collaborate with cybersecurity teams to integrate threat intelligence and update incident response plans specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2026-01-13T12:37:27.702Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699620676aea4a407add8679

Added to database: 2/18/2026, 8:26:15 PM

Last enriched: 2/18/2026, 8:40:39 PM

Last updated: 2/18/2026, 10:46:21 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats