CVE-2026-0662
BaseFortify
Publication date: 2026-02-04
Last updated on: 2026-02-06
Assigner: Autodesk
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| autodesk | 3ds_max | From 2026 (inc) to 2026.3.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-426 | The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs when a maliciously crafted project directory is opened in Autodesk 3ds Max. It exploits an Untrusted Search Path, which means the software may execute code from an unintended location. As a result, arbitrary code can run within the context of the current process.
How can this vulnerability impact me? :
The impact of this vulnerability includes the potential execution of arbitrary code with the privileges of the current process. This can lead to complete compromise of confidentiality, integrity, and availability of the affected system or data.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know