CVE-2025-9460
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-19
Assigner: Autodesk
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| autodesk | shared_components | to 2026.5 (exc) |
| autodesk | 3ds_max | 2026 |
| autodesk | advance_steel | 2026 |
| autodesk | autocad | 2026 |
| autodesk | autocad_architecture | 2026 |
| autodesk | autocad_electrical | 2026 |
| autodesk | autocad_map_3d | 2026 |
| autodesk | autocad_mechanical | 2026 |
| autodesk | autocad_mep | 2026 |
| autodesk | autocad_plant_3d | 2026 |
| autodesk | civil_3d | 2026 |
| autodesk | infraworks | 2026 |
| autodesk | inventor | 2026 |
| autodesk | revit | 2026 |
| autodesk | revit_lt | 2026 |
| autodesk | vault | 2026 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs when a specially crafted SLDPRT file is parsed by certain Autodesk products, leading to an Out-of-Bounds Read. This means the software reads data outside the intended memory boundaries, which can be exploited by an attacker to cause the application to crash, access sensitive information, or execute arbitrary code within the context of the affected process.
How can this vulnerability impact me? :
The impact of this vulnerability includes potential application crashes, unauthorized disclosure of sensitive data, and the possibility for an attacker to execute arbitrary code with the privileges of the affected Autodesk product, which could lead to further system compromise.