Autodesk Trust Center

Security advisory

Advisories are used to communicate information related to vulnerabilities identified with Autodesk® products and services. This includes any fixes or workarounds that are applicable to the affected product.

Multiple Vulnerabilities in Certain Autodesk Products


Autodesk ID: ADSK-SA-2025-0015

Product, Service, Component: Autodesk AutoCAD and certain specialized toolsets, Autodesk Advance Steel, Autodesk Civil 3D, Autodesk 3ds Max, Autodesk InfraWorks, Autodesk Inventor, Autodesk Revit, Autodesk Revit LT, Autodesk Vault

Impact: Memory Corruption, Heap-Based Overflow, Out-of-Bounds Write, Out-of-Bounds Read, Use-After-Free

Severity: High

Original Publish: 07/29/2025

Last Revised: 09/25/2025

Severity CVSS Score Impact
Low 0.1 - 3.9 A vulnerability where scope and impact of exploitation is restricted and the ability to exploit is extremely difficult.
Medium 4.0 - 6.9 A vulnerability where exploitation is mitigated by factors such as difficulty to exploit, default configuration or ease of identification.
High 7.0 - 8.9 A vulnerability, which if exploited, would directly impact the confidentiality, integrity or availability of user's data or processing resources.
Critical 9.0 - 10 A vulnerability, which if exploited, would allow remote execution of malicious code without user action.

Summary

Certain Autodesk products use a shared component that is affected by multiple vulnerabilities listed below. Exploitation of these vulnerabilities can lead to code execution. Exploitation of these vulnerabilities requires user interaction.

Description

The details of the vulnerabilities are as follows:

  1. CVE-2025-5038: A maliciously crafted X_T file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

  2. CVE-2025-5043: A maliciously crafted 3DM file, when linked or imported into certain Autodesk products, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

  3. CVE-2025-6631: A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

  4. CVE-2025-6635: A maliciously crafted PRT file, when linked or imported into certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

  5. CVE-2025-6636: A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

  6. CVE-2025-6637: A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

  7. CVE-2025-7497: A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

  8. CVE-2025-7675: A maliciously crafted 3DM file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

Affected Products

Item: Autodesk AutoCAD 2026 and the following specialized toolsets: Autodesk AutoCAD Architecture 2026, Autodesk AutoCAD Electrical 2026, Autodesk AutoCAD Mechanical 2026, Autodesk AutoCAD MEP 2026, Autodesk AutoCAD Plant 3D 2026, Autodesk AutoCAD Map 3D 2026Autodesk Advance Steel 2026, Autodesk 3ds Max 2026, Autodesk Civil 3D 2026, Autodesk InfraWorks 2026, Autodesk Inventor 2026, Autodesk Revit 2026, Autodesk Revit LT 2026, Autodesk Vault 2026

Impacted Versions: Autodesk Shared Components 2026.2

Mitigated Versions: Autodesk Shared Components 2026.3

Update Source: Autodesk Access or Accounts Portal

 

Item: Autodesk AutoCAD, Autodesk AutoCAD Architecture, Autodesk AutoCAD Electrical, Autodesk AutoCAD Map 3D, Autodesk AutoCAD Mechanical, Autodesk AutoCAD MEP, Autodesk AutoCAD Plant 3D, Autodesk Civil 3D, Autodesk Advance Steel**

Impacted Versions: 2025***, 2024***, 2023***

Mitigated Versions: 2025.1.3, 2024.1.8, 2023.1.8

 

*Note: Product list subject to change.

**Note: Users of Autodesk Advance Steel, Autodesk Civil 3D, and the specialized toolsets of AutoCAD need to install either the AutoCAD product update(s) listed above or a more recent product version. These security fixes are not included in the updates specific to individual toolsets.

***Note: Only three CVEs affect AutoCAD 2025 (CVE-2025-5038, CVE-2025-5043, and CVE-2025-7675).

Recommendations

Autodesk recommends that users install the latest available version of Autodesk Shared Components via Autodesk Access or the Accounts Portal to ensure the latest updates are installed, as these fixes may not be included in host product patches. However, customers do not need to update, uninstall or reinstall their products, as the latest shared component updates can be installed independently. As a general best practice, we also recommend that users only open files from trusted sources.

Acknowledgements

We thank the following researcher for reporting the relevant issues and for working with Autodesk to help protect our users:

  • Mat Powell of Trend Micro Zero Day Initiative for reporting CVE-2025-5038.

  • Rocco Calvi (@TecR0c) with TecSecurity working with Trend Micro Zero Day Initiative for reporting CVE-2025-5043.

  • Anonymous working with Trend Micro Zero Day Initiative for reporting CVE-2025-6631, CVE-2025-6635, CVE-2025-6636, CVE-2025-6637, CVE-2025-7497 and CVE-2025-7675.

     

Revision History

Revision: 1.0

Date: 07/29/2025

Description: Initial Release of the Security Advisory

 

Revision: 1.1

Date: 09/09/2025

Description: Updated Affected Products

 

Revision: 1.2

Date: 09/18/2025

Description: Updated Affected Products

 

Revision: 1.3

Date: 09/25/2025

Description: Updated Affected Products


Disclaimer

INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” IN CONNECTION WITH AUTODESK PRODUCTS. AUTODESK AND/OR ITS RESPECTIVE SUBSIDIARIES, AFFILIATES, SUPPLIERS AND LICENSORS AND ITS AND THEIR DIRECTORS, OFFICERS, EMPLOYEES, AGENTS AND REPRESENTATIVES MAKE NO REPRESENTATIONS ABOUT THE SITE, ANY PRODUCTS AND SERVICES CONTAINED ON THE SITE OR THE SUITABILITY OF THE INFORMATION CONTAINED IN THE MATERIALS, INFORMATION, CONTENT, DOCUMENTS, AND RELATED GRAPHICS PUBLISHED ON THIS SITE FOR ANY PURPOSE. THE SITE, ANY PRODUCTS OR SERVICES (INCLUDING WITHOUT LIMITATION, THIRD PARTY PRODUCTS AND SERVICES) OBTAINED THROUGH THE SITE, AND ALL SUCH INFORMATION, CONTENT, DOCUMENTS, AND RELATED GRAPHICS ARE PROVIDED FOR YOUR USE AT YOUR OWN RISK AND “AS IS” WITHOUT WARRANTY OF ANY KIND. AUTODESK AND/OR ITS RESPECTIVE SUBSIDIARIES, AFFILIATES, SUPPLIERS AND LICENSORS HEREBY DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THIS SITE, SUCH PRODUCTS AND SERVICES AND SUCH INFORMATION, CONTENT, DOCUMENTS, AND RELATED GRAPHICS, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND NON-INFRINGEMENT.