CVE-2025-6635
📋 TL;DR
CVE-2025-6635 is an out-of-bounds read vulnerability in certain Autodesk products that allows attackers to crash applications, read sensitive memory, or execute arbitrary code by tricking users into opening malicious PRT files. This affects users of vulnerable Autodesk software versions. The vulnerability requires user interaction through file opening.
💻 Affected Systems
- Autodesk Access and other unspecified Autodesk products
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with the privileges of the current user, potentially leading to full system compromise.
Likely Case
Application crash or sensitive information disclosure from memory.
If Mitigated
Limited to denial of service if memory protections prevent code execution.
🎯 Exploit Status
Exploitation requires user interaction to open a malicious file; no public exploit details available yet.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched versions
Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015
Restart Required: Yes
Instructions:
1. Visit the Autodesk security advisory URL. 2. Identify affected products and versions. 3. Update to the latest patched version via Autodesk's update mechanism or download from official sources. 4. Restart the application and system if required.
🔧 Temporary Workarounds
Block PRT file execution
allPrevent processing of PRT files in affected Autodesk products to mitigate the vulnerability.
Not applicable - configure via application settings or group policy
User awareness training
allEducate users to avoid opening untrusted PRT files from unknown sources.
🧯 If You Can't Patch
- Restrict user permissions to limit impact of potential code execution.
- Implement application whitelisting to block unauthorized Autodesk software execution.
🔍 How to Verify
Check if Vulnerable:
Check installed Autodesk product versions against the vendor advisory; if using affected versions and processing PRT files, assume vulnerable.
Check Version:
Varies by product; typically check 'About' in application or use command-line tools specific to each Autodesk product.
Verify Fix Applied:
Update to patched version per vendor instructions and verify version number matches advisory.
📡 Detection & Monitoring
Log Indicators:
- Application crashes related to PRT file processing
- Unexpected memory access errors in logs
Network Indicators:
- Downloads of PRT files from untrusted sources
SIEM Query:
Search for events involving Autodesk processes crashing or accessing suspicious PRT files.