CVE-2023-25009

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through malicious USD files in Autodesk software. An attacker can craft a USD file that triggers an out-of-bounds write when opened, potentially leading to full system compromise. Users of affected Autodesk products who open untrusted USD files are at risk.

💻 Affected Systems

Products:
  • Autodesk Maya
  • Autodesk 3ds Max
Versions: Multiple versions prior to the patched releases
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the USD file parsing functionality. All default installations that can open USD files are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer, data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or arbitrary code execution in the context of the user opening the malicious file, potentially leading to data exfiltration or malware installation.

🟢

If Mitigated

No impact if proper patching and security controls are implemented, including user awareness training about opening untrusted files.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious USD file. The vulnerability is in file parsing code, making reliable exploitation possible but requiring specific file crafting.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Maya 2023.3 and 3ds Max 2023.3 (or later versions as specified in vendor advisory)

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0008

Restart Required: Yes

Instructions:

1. Download the latest version from Autodesk's official website or update through Autodesk Desktop App. 2. Install the update following Autodesk's installation instructions. 3. Restart the application and verify the version is updated.

🔧 Temporary Workarounds

Disable USD file association

all

Remove or change file associations so USD files don't automatically open in vulnerable Autodesk software

Windows: Use 'Default Apps' settings to change USD file associations
Linux/macOS: Update mime-type associations to use alternative software

User awareness training

all

Train users to avoid opening USD files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized software
  • Use network segmentation to isolate systems running vulnerable software from critical assets

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Autodesk Maya or 3ds Max against the vulnerable versions listed in the vendor advisory

Check Version:

Windows: Check 'About' in application menu; Linux/macOS: Check application version in help/about or via command line if available

Verify Fix Applied:

Verify the installed version is 2023.3 or later, and test opening known-safe USD files to ensure functionality

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening USD files
  • Unexpected process creation from Autodesk applications
  • File access to suspicious USD files

Network Indicators:

  • Downloads of USD files from untrusted sources
  • Outbound connections from Autodesk applications to suspicious IPs

SIEM Query:

source="*autodesk*" AND (event="crash" OR event="error") AND file_extension="usd"

🔗 References

📤 Share & Export