CVE-2025-5039

7.8 HIGH

📋 TL;DR

This vulnerability allows arbitrary code execution when Autodesk applications load malicious binary files from untrusted locations. Attackers can exploit this by placing specially crafted files in directories the application searches. Users of affected Autodesk products are at risk.

💻 Affected Systems

Products:
  • Autodesk Access
  • Other Autodesk applications referenced in advisory
Versions: Specific versions listed in Autodesk Security Advisory ADSK-SA-2025-0014
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects applications that load binary files from untrusted search paths. Requires user interaction to load malicious files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through remote code execution, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or arbitrary code execution in the context of the current user, allowing attackers to steal credentials, install malware, or access sensitive files.

🟢

If Mitigated

Limited impact with proper access controls and patching, potentially resulting in application crashes or denial of service.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering or existing access to place malicious files in search paths. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version specified in Autodesk Security Advisory ADSK-SA-2025-0014

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0014

Restart Required: Yes

Instructions:

1. Review Autodesk Security Advisory ADSK-SA-2025-0014. 2. Download and install the latest patched version from Autodesk's official website. 3. Restart the application and system as required.

🔧 Temporary Workarounds

Restrict file loading from untrusted locations

all

Configure applications to only load files from trusted directories and disable loading from current working directory or temporary folders.

Implement application whitelisting

windows

Use application control solutions to restrict which binaries can be executed by Autodesk applications.

🧯 If You Can't Patch

  • Implement strict file access controls to prevent users from placing files in application search paths
  • Use network segmentation to isolate affected systems and monitor for suspicious file loading activity

🔍 How to Verify

Check if Vulnerable:

Check installed Autodesk application versions against those listed in ADSK-SA-2025-0014 advisory.

Check Version:

Check application 'About' menu or use vendor-specific version checking tools

Verify Fix Applied:

Verify application version matches or exceeds the patched version specified in the advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected binary file loading from unusual directories
  • Application crashes or abnormal termination
  • Suspicious child processes spawned from Autodesk applications

Network Indicators:

  • Unusual outbound connections from Autodesk processes
  • Downloads of suspicious files to application directories

SIEM Query:

Process creation events where parent process is Autodesk application and child process is unexpected executable

🔗 References

📤 Share & Export