CVE-2025-1428

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to craft malicious CATPART files that trigger an out-of-bounds read when opened in Autodesk AutoCAD. Successful exploitation could lead to application crashes, sensitive data exposure, or arbitrary code execution. All AutoCAD users who open untrusted CATPART files are affected.

💻 Affected Systems

Products:
  • Autodesk AutoCAD
  • Autodesk AutoCAD LT
Versions: 2022 and potentially earlier versions (exact range not specified in provided references)
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing CATPART files, which are CAD part files used in mechanical design.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Arbitrary code execution with current process privileges, potentially leading to full system compromise if AutoCAD runs with elevated permissions.

🟠

Likely Case

Application crash or sensitive memory data leakage, disrupting workflows and potentially exposing confidential information.

🟢

If Mitigated

Limited impact with proper file handling policies and network segmentation, likely resulting in application crashes only.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious file. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest AutoCAD/AutoCAD LT 2022 update (specific version not specified)

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001

Restart Required: No

Instructions:

1. Open AutoCAD. 2. Navigate to Help > Check for Updates. 3. Install all available updates. 4. Alternatively, download latest update from Autodesk website.

🔧 Temporary Workarounds

Restrict CATPART file handling

all

Block or restrict opening of CATPART files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to restrict AutoCAD execution to trusted systems only
  • Use network segmentation to isolate AutoCAD workstations from critical systems

🔍 How to Verify

Check if Vulnerable:

Check AutoCAD version against latest patched version in Autodesk advisory

Check Version:

In AutoCAD: Type 'ABOUT' command or check Help > About AutoCAD

Verify Fix Applied:

Verify AutoCAD version is updated to latest release and test with known safe CATPART files

📡 Detection & Monitoring

Log Indicators:

  • AutoCAD crash logs with memory access violations
  • Unexpected file parsing errors in application logs

Network Indicators:

  • Unusual CATPART file downloads from untrusted sources
  • AutoCAD process spawning unexpected child processes

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName='acad.exe' AND ExceptionCode=0xC0000005

🔗 References

📤 Share & Export