A maliciously crafted file, when executed on the victim's machine, can lead to privilege escalation to NT AUTHORITY/SYSTEM due to an insufficient validation of loaded binaries. An attacker with local and low-privilege access could exploit this to execute code as SYSTEM.
References
| Link | Resource |
|---|---|
| https://emsfs.autodesk.com/utility/odis/1/installer/latest/AdODIS-installer.exe | Product |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0022 | Vendor Advisory |
Configurations
History
12 Nov 2025, 14:34
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| First Time |
Autodesk
Autodesk installer |
|
| CPE | cpe:2.3:a:autodesk:installer:*:*:*:*:*:*:*:* | |
| References | () https://emsfs.autodesk.com/utility/odis/1/installer/latest/AdODIS-installer.exe - Product | |
| References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0022 - Vendor Advisory |
06 Nov 2025, 19:45
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-06 17:15
Updated : 2025-11-12 14:34
NVD link : CVE-2025-10885
Mitre link : CVE-2025-10885
CVE.ORG link : CVE-2025-10885
JSON object : View
Products Affected
autodesk
- installer
CWE
