CVE-2025-10886

7.8 HIGH

📋 TL;DR

This CVE describes a memory corruption vulnerability in Autodesk products when parsing malicious MODEL files. Attackers can exploit this to execute arbitrary code with the privileges of the current process. Users of affected Autodesk software are at risk.

💻 Affected Systems

Products:
  • Autodesk Access
  • Other Autodesk products that parse MODEL files
Versions: Specific versions not detailed in provided references; check vendor advisory for exact ranges
Operating Systems: Windows, macOS, Linux (if supported by affected products)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the file parsing functionality; any configuration that processes MODEL files is affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through remote code execution leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or application compromise leading to data exfiltration from the affected system.

🟢

If Mitigated

Application crash or denial of service if exploit fails or is blocked by security controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious file; no authentication needed beyond file access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024

Restart Required: Yes

Instructions:

1. Visit the Autodesk Trust Center security advisory page.
2. Identify affected products and versions.
3. Download and install the latest updates from Autodesk Account or Autodesk Desktop App.
4. Restart the application and system as required.

🔧 Temporary Workarounds

Restrict MODEL file processing

all

Block or limit processing of untrusted MODEL files through application settings or group policies.

Use application sandboxing

all

Run Autodesk applications in restricted environments or containers to limit exploit impact.

🧯 If You Can't Patch

  • Implement strict file validation policies to block suspicious MODEL files at network perimeters.
  • Use endpoint detection and response (EDR) tools to monitor for memory corruption and code execution attempts.

🔍 How to Verify

Check if Vulnerable:

Check installed Autodesk product versions against the vendor advisory; vulnerable if using affected versions.

Check Version:

Check within the Autodesk application's 'About' or 'Help' menu, or use system command like 'wmic product get name,version' on Windows for installed versions.

Verify Fix Applied:

Verify that Autodesk products are updated to versions listed as patched in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or unexpected terminations when opening MODEL files
  • Unusual process creation from Autodesk applications

Network Indicators:

  • Downloads of MODEL files from untrusted sources
  • Outbound connections from Autodesk processes to suspicious IPs

SIEM Query:

Example: 'process_name:autodesk* AND (event_id:1000 OR event_id:1001) OR file_extension:model AND download_source:external'

🔗 References

📤 Share & Export