CVE-2025-5048

A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_lt:2026:*:*:*:*:-:*:*
cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-08-15 15:15

Updated : 2025-08-20 21:22


NVD link : CVE-2025-5048

Mitre link : CVE-2025-5048

CVE.ORG link : CVE-2025-5048


JSON object : View

Products Affected

autodesk

  • autocad_electrical
  • autocad_map_3d
  • autocad
  • autocad_mep
  • autocad_mechanical
  • autocad_plant_3d
  • autocad_architecture
  • advance_steel
  • autocad_lt
  • civil_3d
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')