CVE-2025-6636
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-07-29
Last updated on: 2025-08-19
Assigner: Autodesk
Description
Description
A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| autodesk | shared_components | 2026.2 |
| autodesk | 3ds_max | 2026 |
| autodesk | advance_steel | 2026 |
| autodesk | autocad | 2026 |
| autodesk | autocad_architecture | 2026 |
| autodesk | autocad_electrical | 2026 |
| autodesk | autocad_map_3d | 2026 |
| autodesk | autocad_mechanical | 2026 |
| autodesk | autocad_mep | 2026 |
| autodesk | autocad_plant_3d | 2026 |
| autodesk | civil_3d | 2026 |
| autodesk | infraworks | 2026 |
| autodesk | inventor | 2026 |
| autodesk | revit | 2026 |
| autodesk | revit_lt | 2026 |
| autodesk | vault | 2026 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Use-After-Free issue triggered by parsing a maliciously crafted PRT file in certain Autodesk products. It allows an attacker to cause a crash, read sensitive data, or execute arbitrary code within the context of the affected process.
How can this vulnerability impact me? :
The vulnerability can impact you by causing application crashes, unauthorized disclosure of sensitive information, or allowing an attacker to execute arbitrary code, potentially compromising the security and integrity of your system.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70