CVE-2025-9458

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious PRT files in affected Autodesk products. Users of Autodesk Access and potentially other Autodesk software are affected when processing untrusted PRT files.

💻 Affected Systems

Products:
  • Autodesk Access
  • Other Autodesk products that parse PRT files
Versions: Specific versions not detailed in provided references; check vendor advisory for exact affected versions.
Operating Systems: Windows, macOS, Linux (if Autodesk products are available)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing PRT files, which are native to Autodesk products. All configurations that process PRT files are likely affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the user running the vulnerable software, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or malware execution when users open malicious PRT files, potentially leading to credential theft or data exfiltration.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only causing application crashes.

🌐 Internet-Facing: MEDIUM - Attackers could host malicious PRT files on websites or send via email, but requires user interaction to open.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared network drives containing malicious PRT files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious PRT file. Memory corruption vulnerabilities often require specific conditions to achieve reliable code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory ADSK-SA-2025-0019 for specific patched versions

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0019

Restart Required: Yes

Instructions:

1. Visit the Autodesk Trust Center advisory. 2. Identify affected products and versions. 3. Update to the latest patched version through Autodesk Access or product-specific update mechanisms. 4. Restart the application after update.

🔧 Temporary Workarounds

Block PRT file execution

all

Prevent execution of PRT files through application control or file extension blocking

Windows: Use AppLocker or Software Restriction Policies to block PRT file execution
macOS/Linux: Use application whitelisting tools

User awareness training

all

Educate users not to open PRT files from untrusted sources

🧯 If You Can't Patch

  • Implement application sandboxing to limit potential damage from code execution
  • Restrict user privileges to prevent system-wide compromise if exploited

🔍 How to Verify

Check if Vulnerable:

Check installed Autodesk product versions against the vendor advisory. Look for PRT file parsing capabilities.

Check Version:

Windows: Check via Control Panel > Programs or Autodesk product About dialog; macOS: Check via Applications folder or product About menu

Verify Fix Applied:

Verify that Autodesk products are updated to versions listed in the vendor advisory as patched.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening PRT files
  • Unusual process creation from Autodesk applications
  • File access to suspicious PRT files

Network Indicators:

  • Downloads of PRT files from untrusted sources
  • Outbound connections from Autodesk processes to suspicious IPs

SIEM Query:

Process creation where parent process contains 'autodesk' AND (command line contains '.prt' OR file path contains '.prt')

🔗 References

📤 Share & Export