CVE-2025-8892

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious PRT files in affected Autodesk products. The memory corruption occurs during PRT file parsing, enabling code execution within the current process context. Users of vulnerable Autodesk software are at risk.

💻 Affected Systems

Products:
  • Autodesk Access and other unspecified Autodesk products
Versions: Specific versions not detailed in provided references; check vendor advisory for exact ranges
Operating Systems: Windows, macOS, Linux (if supported by affected products)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction to open malicious PRT files; default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary code execution, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware installation on the affected workstation when a user opens a malicious PRT file.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only crashing the application.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious file; no public exploit code mentioned in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory ADSK-SA-2025-0019 for specific patched versions

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0019

Restart Required: Yes

Instructions:

1. Visit the Autodesk Trust Center security advisory page
2. Identify affected products and versions
3. Download and install the latest updates from Autodesk Account or Autodesk Desktop App
4. Restart the system after installation

🔧 Temporary Workarounds

Restrict PRT file handling

all

Configure system to open PRT files with non-vulnerable applications or block PRT file execution

Windows: Use Group Policy to modify file association policies
macOS/Linux: Modify default applications for .prt files

User awareness training

all

Educate users to avoid opening PRT files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized executables
  • Use endpoint detection and response (EDR) solutions to monitor for suspicious process behavior

🔍 How to Verify

Check if Vulnerable:

Check installed Autodesk product versions against the vendor advisory; review if PRT file parsing functionality is enabled

Check Version:

Windows: Check via Control Panel > Programs or Autodesk product About dialog; macOS/Linux: Check via application menu or package manager

Verify Fix Applied:

Verify installed product version matches or exceeds patched version listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes related to PRT file parsing
  • Unusual process creation from Autodesk applications
  • File access events for PRT files from untrusted locations

Network Indicators:

  • Downloads of PRT files from external sources
  • Unusual outbound connections following PRT file access

SIEM Query:

source="*autodesk*" AND (event_type="crash" OR process_name="*autodesk*") AND file_extension=".prt"

🔗 References

📤 Share & Export