A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
References
| Link | Resource |
|---|---|
| https://www.autodesk.com/products/autodesk-access/overview | Product |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0019 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-09-22 19:16
Updated : 2025-09-25 18:24
NVD link : CVE-2025-8892
Mitre link : CVE-2025-8892
CVE.ORG link : CVE-2025-8892
JSON object : View
Products Affected
autodesk
- shared_components
- autocad_electrical
- autocad_map_3d
- revit_lt
- vault
- autocad
- 3ds_max
- autocad_mep
- inventor
- autocad_mechanical
- autocad_plant_3d
- autocad_architecture
- advance_steel
- revit
- infraworks
- civil_3d
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
