CVE-2025-1430
📋 TL;DR
This vulnerability allows an attacker to execute arbitrary code on a system by tricking a user into opening a malicious SLDPRT file in Autodesk AutoCAD. It affects AutoCAD users who open untrusted files, potentially leading to full system compromise. The risk is highest for organizations using AutoCAD for design work with external file sources.
💻 Affected Systems
- Autodesk AutoCAD
- Autodesk AutoCAD LT
📦 What is this software?
Advance Steel by Autodesk
Advance Steel by Autodesk
Advance Steel by Autodesk
Advance Steel by Autodesk
Autocad by Autodesk
Autocad by Autodesk
Autocad by Autodesk
Autocad by Autodesk
Autocad Mep by Autodesk
Autocad Mep by Autodesk
Autocad Mep by Autodesk
Autocad Mep by Autodesk
Civil 3d by Autodesk
Civil 3d by Autodesk
Civil 3d by Autodesk
Civil 3d by Autodesk
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via remote code execution, enabling data theft, ransomware deployment, or lateral movement within a network.
Likely Case
Local privilege escalation or malware installation if a user opens a malicious file, often via phishing or compromised websites.
If Mitigated
Limited to denial-of-service or application crash if file parsing is blocked or sandboxed, with no code execution.
🎯 Exploit Status
Exploitation requires user interaction to open a malicious file; no public proof-of-concept is known, but memory corruption vulnerabilities are often exploitable.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Latest update as per Autodesk advisory; check specific version in vendor links.
Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001
Restart Required: No
Instructions:
1. Visit Autodesk's support page for updates. 2. Download and install the latest patch for your AutoCAD version. 3. Verify installation via the application's about or help menu.
🔧 Temporary Workarounds
Block SLDPRT file extensions
allPrevent opening of SLDPRT files in AutoCAD by blocking the file extension at the system or network level.
🧯 If You Can't Patch
- Restrict user permissions to limit code execution impact, e.g., run AutoCAD with reduced privileges.
- Implement application whitelisting to prevent unauthorized executables from running post-exploit.
🔍 How to Verify
Check if Vulnerable:
Check if AutoCAD version is older than the patched release listed in the Autodesk advisory.
Check Version:
In AutoCAD, go to Help > About or check the application properties in the system.
Verify Fix Applied:
Confirm the installed version matches or exceeds the patched version from the vendor advisory.
📡 Detection & Monitoring
Log Indicators:
- Unusual process spawns from AutoCAD, crashes, or errors related to SLDPRT file parsing in application logs.
Network Indicators:
- File downloads of SLDPRT files from untrusted sources, especially via email or web links.
SIEM Query:
Example: 'process:AutoCAD AND (event:crash OR file_extension:sldprt)'