A maliciously crafted RTE file, when parsed through Autodesk Revit, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Jul 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:* |
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 10 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 10 Jul 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A maliciously crafted RTE file, when parsed through Autodesk Revit, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. | |
Title | RTE File Parsing Heap-Based Overflow Vulnerability | |
Weaknesses | CWE-122 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: autodesk
Published: 2025-07-10T11:31:19.454Z
Updated: 2025-08-06T15:43:56.430Z
Reserved: 2025-05-21T13:00:59.934Z
Link: CVE-2025-5040

Updated: 2025-07-10T14:55:40.516Z

Status : Analyzed
Published: 2025-07-10T12:15:23.893
Modified: 2025-07-22T16:50:39.567
Link: CVE-2025-5040

No data.