CVE-2025-1277

A maliciously crafted PDF file, when parsed through Autodesk applications, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*

History

08 May 2025, 15:43

Type Values Removed Values Added
References () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003 - () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003 - Vendor Advisory
CWE CWE-787
First Time Autodesk revit
Autodesk
CPE cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*

16 Apr 2025, 13:25

Type Values Removed Values Added
Summary
  • (es) Un archivo PDF manipulado con fines maliciosos, al analizarse mediante aplicaciones de Autodesk, puede generar una vulnerabilidad de corrupción de memoria. Un agente malicioso puede aprovechar esta vulnerabilidad para ejecutar código arbitrario en el contexto del proceso actual.

15 Apr 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-15 21:15

Updated : 2025-05-08 15:43


NVD link : CVE-2025-1277

Mitre link : CVE-2025-1277

CVE.ORG link : CVE-2025-1277


JSON object : View

Products Affected

autodesk

  • revit
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-787

Out-of-bounds Write