CVE-2025-1273

7.8 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in Autodesk applications allows malicious PDF files to cause crashes, data leaks, or arbitrary code execution. This affects users who open or import PDF files in vulnerable Autodesk software. The vulnerability requires user interaction to open a malicious file.

💻 Affected Systems

Products:
  • Autodesk Access
  • Other Autodesk applications that process PDF files
Versions: Specific versions not detailed in provided references; check vendor advisory for exact ranges.
Operating Systems: Windows, macOS, Linux (if supported by affected applications)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when processing malicious PDF files; default configurations that allow PDF import/linking are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the same privileges as the current user, potentially leading to full system compromise.

🟠

Likely Case

Application crash or denial of service, with potential for limited data exposure.

🟢

If Mitigated

Application crash without data loss if proper file validation is in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious PDF; no public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions.

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003

Restart Required: Yes

Instructions:

1. Visit the Autodesk Trust Center advisory URL.
2. Identify affected products and versions.
3. Download and apply the latest security updates from Autodesk.
4. Restart the application or system as required.

🔧 Temporary Workarounds

Disable PDF Import/Linking

all

Prevent applications from processing PDF files by disabling related features if possible.

Use Application Sandboxing

all

Run Autodesk applications in restricted environments to limit impact of potential exploitation.

🧯 If You Can't Patch

  • Restrict user permissions to limit damage from potential code execution.
  • Implement strict file validation to block suspicious PDFs before processing.

🔍 How to Verify

Check if Vulnerable:

Check installed Autodesk software versions against the vendor advisory; if using affected versions and PDF processing is enabled, assume vulnerable.

Check Version:

Check within the Autodesk application's 'About' or 'Help' menu for version information.

Verify Fix Applied:

Verify that Autodesk applications are updated to patched versions listed in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes related to PDF processing
  • Unusual file access patterns from Autodesk applications

Network Indicators:

  • Downloads of PDF files from untrusted sources followed by application issues

SIEM Query:

Search for events where Autodesk applications crash or exhibit abnormal behavior after file operations.

🔗 References

📤 Share & Export