CVE-2025-10884

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious CATPART files in affected Autodesk products. It affects users of specific Autodesk software versions that process CATIA V5 files. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Autodesk Access
  • Other Autodesk products that parse CATPART files
Versions: Specific versions mentioned in Autodesk advisory ADSK-SA-2025-0024
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open malicious CATPART file. All default configurations that process CATIA V5 files are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full privileges of the current user, potentially leading to complete system takeover, data theft, or ransomware deployment.

🟠

Likely Case

Application crash or denial of service when users open malicious files, with potential for limited code execution in some scenarios.

🟢

If Mitigated

No impact if files are validated before processing or if vulnerable software is not used to open untrusted CATPART files.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious file. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions specified in Autodesk advisory ADSK-SA-2025-0024

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024

Restart Required: Yes

Instructions:

1. Visit Autodesk Trust Center security advisories
2. Locate advisory ADSK-SA-2025-0024
3. Download and install the recommended update for your product
4. Restart the application and system as required

🔧 Temporary Workarounds

Disable CATPART file association

all

Prevent Autodesk products from automatically opening CATPART files

Windows: Use 'Default Apps' settings to change file associations
macOS: Use 'Get Info' on CATPART files to change default application

Implement file validation

all

Use security software to scan CATPART files before opening

Deploy endpoint protection with file validation capabilities

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of vulnerable Autodesk software
  • Educate users to never open CATPART files from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check if you're using affected Autodesk software versions listed in advisory ADSK-SA-2025-0024

Check Version:

Within Autodesk application: Help → About or check installed programs in system settings

Verify Fix Applied:

Verify installed version matches or exceeds patched version from Autodesk advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening CATPART files
  • Unusual process creation from Autodesk applications
  • Memory access violation errors in application logs

Network Indicators:

  • Downloads of CATPART files from untrusted sources
  • Unusual outbound connections after opening CATPART files

SIEM Query:

source="*autodesk*" AND (event_type="crash" OR event_type="access_violation") AND file_extension=".CATPART"

🔗 References

📤 Share & Export