CVE-2025-1652

7.8 HIGH

📋 TL;DR

This CVE describes an out-of-bounds read vulnerability in Autodesk AutoCAD when parsing malicious MODEL files. Attackers can exploit this to crash the application, read sensitive memory data, or potentially execute arbitrary code. All AutoCAD users who open untrusted MODEL files are affected.

💻 Affected Systems

Products:
  • Autodesk AutoCAD
Versions: Specific versions not detailed in references; likely multiple recent versions based on typical Autodesk vulnerability patterns
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when opening malicious MODEL files; AutoCAD installations with default settings are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or lateral movement within the network.

🟠

Likely Case

Application crashes and potential information disclosure through memory reads, disrupting workflow and exposing sensitive data.

🟢

If Mitigated

Limited to denial of service through crashes if memory protections prevent code execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious file; memory corruption vulnerabilities can be challenging to weaponize reliably.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest AutoCAD updates as referenced in Autodesk security advisory

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001

Restart Required: No

Instructions:

1. Open AutoCAD. 2. Navigate to Help > Check for Updates. 3. Install all available updates. 4. Alternatively, download latest version from Autodesk website.

🔧 Temporary Workarounds

Restrict MODEL file handling

all

Configure AutoCAD to open MODEL files only from trusted sources using application restrictions or group policies.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized AutoCAD execution
  • Educate users to never open MODEL files from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check AutoCAD version against patched versions listed in Autodesk security advisory ADSK-SA-2025-0001

Check Version:

In AutoCAD: Help > About AutoCAD

Verify Fix Applied:

Verify AutoCAD version matches or exceeds patched version from Autodesk advisory

📡 Detection & Monitoring

Log Indicators:

  • AutoCAD crash logs with memory access violations
  • Unexpected MODEL file access patterns

Network Indicators:

  • Unusual MODEL file downloads to AutoCAD workstations

SIEM Query:

Process:AutoCAD.exe AND (EventID:1000 OR ExceptionCode:c0000005)

🔗 References

📤 Share & Export