CVE-2025-9457

7.8 HIGH

📋 TL;DR

A memory corruption vulnerability in Autodesk products allows arbitrary code execution when parsing malicious PRT files. Attackers can exploit this to run code with the same privileges as the current process. Users of affected Autodesk software are at risk.

💻 Affected Systems

Products:
  • Autodesk Access
  • Other Autodesk products that parse PRT files
Versions: Specific versions not detailed in provided references; check vendor advisory for exact ranges.
Operating Systems: Windows, macOS, Linux (if supported by affected products)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction to open a malicious PRT file. Default configurations are vulnerable as no special settings are needed to trigger the issue.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or targeted attacks against users who open malicious PRT files, potentially leading to malware installation.

🟢

If Mitigated

Limited impact if proper application sandboxing, least privilege principles, and file validation are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a file). No public proof-of-concept is known at this time, but memory corruption vulnerabilities are often weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0024

Restart Required: Yes

Instructions:

1. Visit the vendor advisory URL for details.
2. Update affected Autodesk products to the latest patched version via the official update mechanism.
3. Restart the application or system as required after update.

🔧 Temporary Workarounds

Block PRT file extensions

all

Prevent execution or opening of PRT files via email filters or endpoint protection.

Use application sandboxing

all

Run Autodesk products in restricted environments or with reduced privileges.

🧯 If You Can't Patch

  • Implement strict file validation policies to block untrusted PRT files.
  • Educate users on the risks of opening files from unknown sources and enforce security awareness training.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Autodesk products against the patched versions listed in the vendor advisory.

Check Version:

Varies by product; typically found in 'Help' > 'About' menu within the application or via command line depending on the product.

Verify Fix Applied:

Confirm that the product version matches or exceeds the patched version specified in the advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes or memory access violations in Autodesk applications
  • Log entries indicating failed file parsing or corruption errors

Network Indicators:

  • Unusual outbound connections from Autodesk processes post-file opening
  • File downloads of PRT files from untrusted sources

SIEM Query:

Search for event IDs related to application crashes or file access anomalies involving Autodesk executables and .prt file extensions.

🔗 References

📤 Share & Export