CVE-2025-10885

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers with low privileges to escalate to SYSTEM-level privileges by exploiting insufficient binary validation. It affects systems running vulnerable Autodesk software where an attacker already has local access.

💻 Affected Systems

Products:
  • Autodesk software using the vulnerable installer component
Versions: Specific versions not detailed in provided references; check vendor advisory for exact ranges.
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access and ability to execute malicious files; affects systems with vulnerable Autodesk software installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, or access sensitive system resources.

🟢

If Mitigated

Limited impact if proper access controls, application whitelisting, and least privilege principles are enforced.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly exploitable over network.
🏢 Internal Only: HIGH - Significant risk in environments with unpatched Autodesk software where attackers gain initial foothold through phishing or other means.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to execute crafted files; complexity appears low based on description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0022

Restart Required: Yes

Instructions:

1. Visit the Autodesk security advisory URL. 2. Identify affected products and versions. 3. Download and apply the latest patches from Autodesk. 4. Restart affected systems.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Implement least privilege principles to limit local user access and reduce attack surface.

Application control policies

windows

Use Windows AppLocker or similar to restrict execution of unauthorized binaries.

🧯 If You Can't Patch

  • Implement strict access controls to prevent local attackers from gaining initial foothold.
  • Monitor for suspicious privilege escalation attempts and file execution events.

🔍 How to Verify

Check if Vulnerable:

Check installed Autodesk software versions against the vendor advisory; examine system for the vulnerable installer component.

Check Version:

Check through Autodesk product interfaces or Windows Programs and Features for version numbers.

Verify Fix Applied:

Verify that Autodesk software has been updated to patched versions listed in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing privilege escalation attempts, unexpected SYSTEM-level process creation, or execution of suspicious binaries.

Network Indicators:

  • Unusual outbound connections from SYSTEM processes post-exploitation.

SIEM Query:

Example: Process creation events where parent process is low-privileged user and child process runs as SYSTEM.

🔗 References

📤 Share & Export