CVE-2026-0534

7.1 HIGH

📋 TL;DR

This stored cross-site scripting vulnerability in Autodesk Fusion allows attackers to inject malicious HTML into part attributes. When users click the compromised content, attackers can read local files or execute arbitrary code within the application's context. All users of vulnerable Autodesk Fusion desktop versions are affected.

💻 Affected Systems

Products:
  • Autodesk Fusion
Versions: Specific vulnerable versions not specified in advisory; all versions before patched release likely affected.
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in desktop application, not web interface. Requires user to open malicious Fusion file and interact with compromised part attribute.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary code execution, leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Local file theft, session hijacking, or credential harvesting through malicious JavaScript execution.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, potentially only UI manipulation.

🌐 Internet-Facing: MEDIUM - Requires user interaction with stored malicious content, but can be triggered via shared files.
🏢 Internal Only: HIGH - Internal users frequently share Fusion files, increasing exposure to malicious payloads.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to deliver malicious Fusion file and user interaction to trigger. Stored XSS allows persistent attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version specified in Autodesk Security Advisory ADSK-SA-2026-0001

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0001

Restart Required: Yes

Instructions:

1. Open Autodesk Fusion. 2. Check for updates via Help > Check for Updates. 3. Download and install latest version. 4. Restart application.

🔧 Temporary Workarounds

Disable JavaScript in Fusion

all

Prevents JavaScript execution in part attributes (may break legitimate functionality)

Not applicable - configuration setting within application

Restrict File Sources

all

Only open Fusion files from trusted sources and verify file integrity

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized code execution
  • Use network segmentation to isolate Fusion workstations from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check current Fusion version against patched version in Autodesk advisory ADSK-SA-2026-0001

Check Version:

In Fusion: Help > About Fusion (Windows) or Fusion > About Fusion (macOS)

Verify Fix Applied:

Confirm installed version matches or exceeds patched version from advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from Fusion process
  • Unexpected child processes spawned by Fusion

Network Indicators:

  • Unexpected outbound connections from Fusion to external domains

SIEM Query:

process_name:"Fusion.exe" AND (process_child_count > 0 OR file_access:"*.txt" OR file_access:"*.pdf")

🔗 References

📤 Share & Export