A maliciously crafted binary file, when present while loading files in certain Autodesk applications, could lead to execution of arbitrary code in the context of the current process due to an untrusted search path being utilized.
History

Wed, 30 Jul 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Autodesk
Autodesk infrastructure Parts Editor
Autodesk inventor
Autodesk navisworks Manage
Autodesk navisworks Simulate
Autodesk revit
Autodesk vault
CPEs cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:navisworks_manage:*:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:navisworks_simulate:*:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:vault:*:*:*:*:*:*:*:*
Vendors & Products Autodesk
Autodesk infrastructure Parts Editor
Autodesk inventor
Autodesk navisworks Manage
Autodesk navisworks Simulate
Autodesk revit
Autodesk vault

Thu, 24 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 24 Jul 2025 17:15:00 +0000

Type Values Removed Values Added
Description A maliciously crafted binary file, when present while loading files in certain Autodesk applications, could lead to execution of arbitrary code in the context of the current process due to an untrusted search path being utilized.
Title Privilege Ecalation due to Untrusted Search Path Vulnerability
Weaknesses CWE-426
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: autodesk

Published: 2025-07-24T17:11:14.714Z

Updated: 2025-07-25T03:55:30.703Z

Reserved: 2025-05-21T13:00:59.147Z

Link: CVE-2025-5039

cve-icon Vulnrichment

Updated: 2025-07-24T19:22:17.578Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-24T17:15:32.817

Modified: 2025-07-30T17:45:03.227

Link: CVE-2025-5039

cve-icon Redhat

No data.