CVE-2025-1277

7.8 HIGH

📋 TL;DR

A memory corruption vulnerability in Autodesk applications allows arbitrary code execution when processing malicious PDF files. Attackers can exploit this to run code with the same privileges as the application user. This affects users of vulnerable Autodesk software versions.

💻 Affected Systems

Products:
  • Autodesk Access
  • Other Autodesk applications with PDF parsing capabilities
Versions: Specific versions not detailed in provided references; check vendor advisory for exact affected versions
Operating Systems: Windows, macOS, Linux (if applicable)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected Autodesk products are vulnerable when processing PDF files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware installation on individual workstations running vulnerable Autodesk applications.

🟢

If Mitigated

Limited impact with proper application sandboxing, least privilege principles, and network segmentation in place.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious PDF file. No authentication needed once file is opened.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003

Restart Required: Yes

Instructions:

1. Visit the Autodesk security advisory page
2. Identify affected products and versions
3. Download and install the latest updates from Autodesk
4. Restart affected applications or system as required

🔧 Temporary Workarounds

Disable PDF file association

all

Prevent Autodesk applications from automatically opening PDF files

Windows: Use 'Default Apps' settings to change PDF association
macOS: Use 'Get Info' on PDF files to change 'Open With' setting

Application sandboxing

all

Run Autodesk applications in restricted environments

Windows: Use AppLocker or Windows Sandbox
macOS: Use sandbox-exec or create restricted user accounts

🧯 If You Can't Patch

  • Implement strict file validation policies to block suspicious PDF files
  • Use network segmentation to isolate Autodesk workstations from critical systems

🔍 How to Verify

Check if Vulnerable:

Check installed Autodesk application versions against vendor advisory

Check Version:

Windows: Check 'About' in Autodesk application menus; macOS: Check 'About [Application Name]' in menu bar

Verify Fix Applied:

Verify application version matches or exceeds patched version specified in advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing PDF files
  • Unusual process creation from Autodesk applications
  • Memory access violations in application logs

Network Indicators:

  • Unexpected outbound connections from Autodesk applications
  • File downloads to Autodesk application directories

SIEM Query:

source="autodesk_logs" AND (event_type="crash" OR process_name="malicious.exe")

🔗 References

📤 Share & Export