CVE-2025-10882

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code or cause crashes by tricking users into opening malicious X_T files in affected Autodesk products. It affects users of specific Autodesk software versions that parse X_T files. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Autodesk Access
  • Other Autodesk products that parse X_T files
Versions: Specific versions listed in Autodesk advisory ADSK-SA-2025-0024
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing malicious X_T files through affected Autodesk applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crashes and denial of service through crafted X_T files.

🟢

If Mitigated

Limited impact with proper file validation and user awareness preventing malicious file execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious file. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions specified in Autodesk advisory ADSK-SA-2025-0024

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024

Restart Required: Yes

Instructions:

1. Visit Autodesk Trust Center security advisories
2. Locate ADSK-SA-2025-0024
3. Download and install the recommended updates for your affected products
4. Restart the application and system as required

🔧 Temporary Workarounds

Disable X_T file association

all

Prevent Autodesk applications from automatically opening X_T files

Windows: Use 'Default Apps' settings to change X_T file association
macOS: Use 'Get Info' on X_T files to change default application

Implement file validation

all

Block or quarantine suspicious X_T files at network perimeter

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized executables
  • Educate users to avoid opening X_T files from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check if running affected Autodesk product versions listed in ADSK-SA-2025-0024

Check Version:

Within Autodesk application: Help > About or check installed programs in system settings

Verify Fix Applied:

Verify installed version matches or exceeds patched versions in advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening X_T files
  • Unexpected process creation from Autodesk applications
  • Memory access violation errors

Network Indicators:

  • Downloads of X_T files from untrusted sources
  • Unusual outbound connections from Autodesk processes

SIEM Query:

source="autodesk" AND (event_type="crash" OR process_name="*autodesk*") AND file_extension=".x_t"

🔗 References

📤 Share & Export