CVE-2025-10900
📋 TL;DR
This CVE describes an out-of-bounds write vulnerability in Autodesk products when parsing malicious MODEL files. Attackers can exploit this to crash applications, corrupt data, or execute arbitrary code with the privileges of the current process. Users of affected Autodesk software are at risk.
💻 Affected Systems
- Autodesk Access
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or ransomware deployment.
Likely Case
Application crashes and denial of service affecting productivity workflows.
If Mitigated
Limited impact through application sandboxing or restricted user privileges.
🎯 Exploit Status
Exploitation requires user interaction to open a malicious file; no authentication needed beyond file access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Autodesk Security Advisory ADSK-SA-2025-0024 for specific patched versions.
Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024
Restart Required: Yes
Instructions:
1. Visit the Autodesk Security Advisory URL.
2. Identify affected products and versions.
3. Update to the latest patched version via Autodesk Access or official download channels.
4. Restart the application and system if required.
🔧 Temporary Workarounds
Restrict MODEL File Handling
allBlock or limit processing of untrusted MODEL files through application policies or user training.
Use Least Privilege
allRun Autodesk applications with restricted user privileges to limit impact of potential code execution.
🧯 If You Can't Patch
- Isolate affected systems from untrusted networks and users.
- Implement application allowlisting to prevent execution of malicious files.
🔍 How to Verify
Check if Vulnerable:
Check installed Autodesk product versions against the vendor advisory; if using unpatched versions, assume vulnerable.
Check Version:
Check via Autodesk Access interface or product 'About' menu; command varies by OS and product.
Verify Fix Applied:
Confirm version is updated to patched release specified in Autodesk advisory and test with safe files.
📡 Detection & Monitoring
Log Indicators:
- Application crashes with memory access violations
- Unexpected file parsing errors in Autodesk logs
Network Indicators:
- Unusual outbound connections from Autodesk processes post-file opening
SIEM Query:
Example: 'source="autodesk_logs" AND (event_id="1000" OR message="*out-of-bounds*" OR message="*access violation*")'