A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the Autodesk Installer application. Exploitation of this vulnerability may lead to code execution.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Jul 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:autodesk:installer:*:*:*:*:*:*:*:* |
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 10 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 10 Jun 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the Autodesk Installer application. Exploitation of this vulnerability may lead to code execution. | |
Title | Privilege Ecalation due to Untrusted Search Path Vulnerability | |
Weaknesses | CWE-426 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: autodesk
Published: 2025-06-10T14:50:15.088Z
Updated: 2025-06-12T03:55:18.781Z
Reserved: 2025-05-29T14:52:55.445Z
Link: CVE-2025-5335

Updated: 2025-06-10T14:55:40.783Z

Status : Analyzed
Published: 2025-06-10T15:15:25.703
Modified: 2025-07-29T18:54:26.967
Link: CVE-2025-5335

No data.