CVE-2025-5046

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to exploit an out-of-bounds read in Autodesk AutoCAD when processing malicious DGN files. Attackers could crash the application, read sensitive memory data, or potentially execute arbitrary code. Users of affected AutoCAD versions who open untrusted DGN files are at risk.

💻 Affected Systems

Products:
  • Autodesk AutoCAD
Versions: Specific versions not detailed in provided references; check Autodesk advisory for exact affected versions.
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when AutoCAD processes DGN files, which may occur through linking, importing, or opening operations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the same privileges as the AutoCAD process, potentially leading to full system compromise.

🟠

Likely Case

Application crash or sensitive data disclosure from memory, disrupting workflows and potentially exposing confidential information.

🟢

If Mitigated

Limited impact with proper file handling controls and network segmentation, potentially just application crashes.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but could be delivered via email or web downloads.
🏢 Internal Only: HIGH - Internal users frequently exchange CAD files, increasing exposure to malicious content.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious DGN files; no public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Autodesk advisory ADSK-SA-2025-0017 for specific patched versions

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0017

Restart Required: Yes

Instructions:

1. Open Autodesk Access or AutoCAD
2. Check for updates in the product
3. Apply the latest security update from Autodesk
4. Restart AutoCAD after installation

🔧 Temporary Workarounds

Block DGN file processing

windows

Prevent AutoCAD from processing DGN files by disabling related features or using application controls.

Use trusted file sources only

all

Implement policies to only open DGN files from trusted, verified sources.

🧯 If You Can't Patch

  • Implement application whitelisting to restrict AutoCAD execution to trusted systems only.
  • Use network segmentation to isolate AutoCAD workstations from critical systems.

🔍 How to Verify

Check if Vulnerable:

Check AutoCAD version against affected versions listed in Autodesk advisory ADSK-SA-2025-0017.

Check Version:

In AutoCAD: Type 'ABOUT' command or check Help > About AutoCAD

Verify Fix Applied:

Verify AutoCAD version is updated to patched version specified in Autodesk advisory.

📡 Detection & Monitoring

Log Indicators:

  • AutoCAD crash logs with memory access violations
  • Unexpected DGN file processing events in application logs

Network Indicators:

  • Downloads of DGN files from untrusted sources
  • Unusual network connections from AutoCAD process

SIEM Query:

EventID=1000 OR EventID=1001 Source='AutoCAD' AND (Message LIKE '%access violation%' OR Message LIKE '%out of bounds%')

🔗 References

📤 Share & Export