CVE Alert: CVE-2025-8892 – Autodesk – Shared Components

CVE-2025-8892

HIGHNo exploitation known

A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR NONE · UI REQUIRED · S UNCHANGED
Vendor
Autodesk
Product
Shared Components
Versions
2026.1 lt 2026.4
CWE
CWE-120, CWE-120 Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Published
2025-09-22T19:01:28.720Z
Updated
2025-09-23T03:55:40.308Z
cpe:2.3:a:autodesk:shared_components:2026.4:*:*:*:*:*:*:*

AI Summary Analysis

**Risk verdict** High risk: memory corruption in Autodesk Shared Components can be triggered by parsing a crafted PRT file, allowing code execution in the user’s context after a local action.

**Why this matters** CAD workflows frequently involve opening PRT files from external sources. A compromised file could disable or seize control of a workstation, expose design data, or enable movement into adjacent systems in a trusted network.

**Most likely attack path** An attacker crafts a malicious PRT and delivers it via email or file sharing; the user opens it with an affected Autodesk product. The exploit is local and UI‑driven, with no privileges required, but if the product runs with high rights, the attacker could attain a high integrity compromise on the host.

**Who is most exposed** Organisations with enterprise Autodesk deployments, especially design studios and manufacturing/architecture firms, where CAD workstations access shared components and networked file stores.

Detection ideas

  • Crashes or memory errors in Autodesk processes after opening a PRT.
  • Memory dumps or stack traces tied to PRT parsing.
  • Unusual Autodesk process activity or privilege changes following receipt of a file.
  • Suspicious PRT files or attachments intercepted by email/file security tools.
  • EDR alerts for anomalous code execution within Autodesk components.

Mitigation and prioritisation

  • Apply vendor patch to affected versions (update to 2026.4 or later); verify in staging before broad rollout.
  • Implement least‑privilege execution for CAD workstations; restrict PRT parsing where feasible; enable application allowlisting.
  • Enforce strict file‑handling controls: sandbox or isolate external CAD attachments; scan PRT files with updated AV/EDR.
  • Change‑management: schedule patch window, communicate to users, and test CAD workflows post‑patch.
  • Monitoring: enable memory‑related telemetry and crash reporting for Autodesk processes; watch for post‑patch anomalies.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.