CVE-2025-10885

A maliciously crafted file, when executed on the victim's machine, can lead to privilege escalation to NT AUTHORITY/SYSTEM due to an insufficient validation of loaded binaries. An attacker with local and low-privilege access could exploit this to execute code as SYSTEM.
Configurations

Configuration 1 (hide)

cpe:2.3:a:autodesk:installer:*:*:*:*:*:*:*:*

History

12 Nov 2025, 14:34

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Autodesk
Autodesk installer
CPE cpe:2.3:a:autodesk:installer:*:*:*:*:*:*:*:*
References () https://emsfs.autodesk.com/utility/odis/1/installer/latest/AdODIS-installer.exe - () https://emsfs.autodesk.com/utility/odis/1/installer/latest/AdODIS-installer.exe - Product
References () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0022 - () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0022 - Vendor Advisory

06 Nov 2025, 19:45

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-06 17:15

Updated : 2025-11-12 14:34


NVD link : CVE-2025-10885

Mitre link : CVE-2025-10885

CVE.ORG link : CVE-2025-10885


JSON object : View

Products Affected

autodesk

  • installer
CWE
CWE-250

Execution with Unnecessary Privileges

NVD-CWE-noinfo