CVE-2023-25007

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through a malicious USD (Universal Scene Description) file. Attackers can craft a file that triggers an uninitialized pointer when opened in vulnerable Autodesk software, potentially allowing them to execute arbitrary code on the victim's system. Users of affected Autodesk products who open untrusted USD files are at risk.

💻 Affected Systems

Products:
  • Autodesk Maya
  • Autodesk 3ds Max
  • Autodesk MotionBuilder
Versions: Multiple versions prior to 2023.3
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable when opening USD files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user opening the malicious file, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Limited code execution in the context of the user account opening the file, allowing data exfiltration, credential theft, or installation of additional malware.

🟢

If Mitigated

No impact if proper controls prevent execution of malicious files or if software is patched.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious file. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.3 or later

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0008

Restart Required: Yes

Instructions:

1. Open the Autodesk Desktop App or access Autodesk Account. 2. Check for updates for affected products. 3. Install version 2023.3 or later. 4. Restart the application after installation.

🔧 Temporary Workarounds

Disable USD file association

all

Prevent USD files from automatically opening in vulnerable Autodesk applications

Windows: Use 'Default Apps' settings to change USD file association
macOS: Use 'Get Info' on USD files to change default application
Linux: Update .desktop files or mime-type associations

Block USD files at perimeter

all

Prevent download of potentially malicious USD files

Configure email/web filters to block .usd, .usda, .usdc, .usdz file extensions

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Restrict user permissions to limit potential damage from successful exploitation

🔍 How to Verify

Check if Vulnerable:

Check installed version of Autodesk Maya, 3ds Max, or MotionBuilder. If version is earlier than 2023.3, the system is vulnerable.

Check Version:

Windows: Check 'About' in application menu; Linux/macOS: Run application with --version flag or check About dialog

Verify Fix Applied:

Confirm installed version is 2023.3 or later and attempt to open a known-safe USD file to verify functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening USD files
  • Unexpected process creation from Autodesk applications
  • File access to suspicious USD files

Network Indicators:

  • Downloads of USD files from untrusted sources
  • Outbound connections from Autodesk applications to unknown IPs

SIEM Query:

source="*autodesk*" AND (event_type="crash" OR process_name="maya.exe" OR process_name="3dsmax.exe") AND file_extension="usd"

🔗 References

📤 Share & Export