CVE Alert: CVE-2025-9458 – Autodesk – Shared Components

CVE-2025-9458

HIGHNo exploitation known

A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR NONE · UI REQUIRED · S UNCHANGED
Vendor
Autodesk
Product
Shared Components
Versions
2026.3 lt 2026.4
CWE
CWE-120, CWE-120 Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Published
2025-11-07T18:01:48.595Z
Updated
2025-11-07T18:18:55.209Z
cpe:2.3:a:autodesk:shared_components:2026.4:*:*:*:*:*:*:*

AI Summary Analysis

Risk verdict

High risk: memory corruption via crafted PRT parsing could allow arbitrary code execution; no active exploitation reported in KEV/ADP data, but patching is urgent when available.

Why this matters

The flaw requires user interaction but grants code execution in the current process with full context, making sensitive CAD data and workflows vulnerable to compromise. In practice, an attacker could exfiltrate designs, deploy ransomware within design environments, or pivot to connected systems during typical engineering pipelines.

Most likely attack path

Attacker must lure a user to open or import a malicious PRT file local to the machine; no remote access required. Exploitation hinges on a trusted Autodesk process handling PRT input, so preconditions are the presence of the affected component and user interaction. If successful, code executes with the user’s permissions, enabling lateral movement to adjacent processes or data on the same host.

Who is most exposed

Typically organisations using Autodesk CAD toolchains with shared components on Windows desktops; risk amplified in design studios, engineering firms, and manufacturing operations where PRT assets are routinely exchanged.

Detection ideas

  • Unexpected crashes or memory corruption dumps in Autodesk processes after opening PRT files.
  • Unusual spikes in CPU/memory during file import or project load sequences.
  • Event logs showing application faults or crash signatures tied to PRT parsing.
  • Delivery of crafted PRT files via phishing or external transfers.
  • Anomalous process spawn from the CAD environment around file import events.

Mitigation and prioritisation

  • Apply the official Autodesk patch once released (verify version 2026.4+ or vendor guidance).
  • Implement application allow-listing and restrict handling of external PRT files to trusted workflows.
  • Enforce user training to avoid opening unknown PRT attachments; reinforce secure file provenance.
  • Deploy EDR/telemetry to detect memory corruption patterns and abnormal Autodesk process behavior.
  • If KEV is active or EPSS ≥ 0.5, treat as priority 1; otherwise follow standard patch cadence with rapid deployment after testing.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features