CVE Alert: CVE-2025-8894 – Autodesk – Revit

CVE-2025-8894

HIGHNo exploitation known

A maliciously crafted PDF file, when parsed through certain Autodesk products, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR NONE · UI REQUIRED · S UNCHANGED
Vendor
Autodesk, Autodesk, Autodesk, Autodesk, Autodesk, Autodesk, Autodesk, Autodesk, Autodesk, Autodesk, Autodesk
Product
Revit, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D, AutoCAD MAP 3D, Civil 3D, Advance Steel
Versions
2026 lt 2026.3 | 2025 lt 2025.4.3 | 2026 lt 2026.1 | 2025 lt 2025.1.3 | 2026 lt 2026.1 | 2025 lt 2025.1.3 | 2026 lt 2026.1 | 2025 lt 2025.1.3 | 2026 lt 2026.1 | 2025 lt 2025.1.3 | 2026 lt 2026.1 | 2025 lt 2025.1.3 | 2026 lt 2026.1 | 2025 lt 2025.1.3 | 2026 lt 2026.1 | 2025 lt 2025.1.3 | 2026 lt 2026.1 | 2025 lt 2025.1.3 | 2026 lt 2026.1 | 2025 lt 2025.1.3 | 2026 lt 2026.1 | 2025 lt 2025.1.3
CWE
CWE-122, CWE-122 Heap-Based Buffer Overflow
Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Published
2025-09-16T14:19:30.719Z
Updated
2025-09-16T14:40:37.110Z
cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*cpe:2.3:a:autodesk:revit:2025:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad:2025:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_lt:2026:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_lt:2025:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_architecture:2025:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_electrical:2025:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_mechanical:2025:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_mep:2025:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_plant_3d:2025:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*cpe:2.3:a:autodesk:autocad_map_3d:2025:*:*:*:*:*:*:*cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*cpe:2.3:a:autodesk:civil_3d:2025:*:*:*:*:*:*:*cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*cpe:2.3:a:autodesk:advance_steel:2025:*:*:*:*:*:*:*

AI Summary Analysis

**Risk verdict** High risk to Autodesk CAD/BIM users from a PDF parsing heap overflow; no active exploitation flagged in the data, but patching should be treated as urgent.

**Why this matters** A malicious PDF could allow arbitrary code execution within the affected product, potentially exfiltrating data, altering designs, or causing design-workflow downtime. Given widespread use of AutoCAD, Revit and related tools in design firms, a single successful exploit could disrupt projects across multiple teams.

**Most likely attack path** Attacker delivers a crafted PDF; a logged-in user opens it in an affected Autodesk product. The parser vulnerability executes as the current user (no privileges required), via a local attack on a crafted document with user interaction. This can lead to code execution, data access or process crash within the product’s context, with limited preconditions beyond a reachable workstation.

**Who is most exposed** Organisations deploying Autodesk CAD/BIM suites on Windows desktops, especially architecture/engineering consultancies and design studios with shared CAD data and PDF workflows.

Detection ideas

  • Crashes and dump generation in Autodesk processes after opening PDFs
  • Sudden spikes in memory or CPU during PDF processing
  • Event/log entries or crash reports tied to PDF parsing
  • Unusual process spawning from AutoCAD/Revit processes
  • EDR alerts for memory corruption indicators during PDF handling

Mitigation and prioritisation

  • Apply vendor patches to fixed builds (e.g., ≥2026.3 for affected lines; follow Autodesk advisories).
  • Patch management: test in staging, then deploy across affected workstations; enable automatic updates if feasible.
  • Implement least-privilege and application allowlisting for CAD workstations; restrict local PDF handling where possible.
  • User training to avoid opening untrusted PDFs; scan and quarantine PDFs before opening in design apps. If KEV/EPSS data becomes available, reassess prioritisation accordingly.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.