CVE-2025-10881

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to exploit a heap-based buffer overflow when Autodesk products parse malicious CATPRODUCT files. Successful exploitation could lead to crashes, data theft, or arbitrary code execution. Users of affected Autodesk products are at risk.

💻 Affected Systems

Products:
  • Autodesk Access
  • Other Autodesk products that parse CATPRODUCT files
Versions: Specific versions not detailed in provided references; check vendor advisory for exact ranges.
Operating Systems: Windows, macOS, Linux (if supported by affected products)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing CATPRODUCT files; risk exists in default configurations where these files are processed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with system-level privileges, potentially leading to complete system compromise and data exfiltration.

🟠

Likely Case

Application crashes and denial of service, with potential for limited data exposure or code execution in user context.

🟢

If Mitigated

Application crash with no data loss if proper file validation and sandboxing are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open malicious files; no authentication needed once file is accessed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory ADSK-SA-2025-0024 for specific patched versions.

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024

Restart Required: Yes

Instructions:

1. Review Autodesk advisory ADSK-SA-2025-0024. 2. Identify affected products and versions. 3. Download and apply the latest security updates from Autodesk. 4. Restart affected applications or systems as required.

🔧 Temporary Workarounds

Restrict CATPRODUCT file handling

all

Block or restrict processing of CATPRODUCT files through application settings or system policies.

User awareness training

all

Educate users to avoid opening untrusted CATPRODUCT files from unknown sources.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized binaries.
  • Use network segmentation to isolate systems running vulnerable software from critical assets.

🔍 How to Verify

Check if Vulnerable:

Check installed Autodesk product versions against the patched versions listed in advisory ADSK-SA-2025-0024.

Check Version:

Check via Autodesk product 'About' menu or system documentation for version information.

Verify Fix Applied:

Confirm that Autodesk products are updated to versions specified in the vendor advisory and test with safe CATPRODUCT files.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes related to CATPRODUCT file parsing
  • Unexpected memory access errors in application logs

Network Indicators:

  • Unusual outbound connections from Autodesk processes post-file opening

SIEM Query:

source="autodesk_logs" AND (event="crash" OR event="memory_error") AND file_extension="CATPRODUCT"

🔗 References

📤 Share & Export