Home

Description

A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

PUBLISHED Reserved 2025-08-12 | Published 2025-09-22 | Updated 2025-11-07 | Assigner autodesk




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unaffected

2026.3 (custom) before 2026.4
affected

References

www.autodesk.com/products/autodesk-access/overview patch

www.autodesk.com/trust/security-advisories/adsk-sa-2025-0019 vendor-advisory

cve.org (CVE-2025-8892)

nvd.nist.gov (CVE-2025-8892)

Download JSON