A maliciously crafted PRT file, when linked or imported into certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
History

Mon, 04 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Autodesk 3ds Max
Autodesk advance Steel
Autodesk autocad
Autodesk autocad Architecture
Autodesk autocad Electrical
Autodesk autocad Map 3d
Autodesk autocad Mechanical
Autodesk autocad Mep
Autodesk autocad Plant 3d
Autodesk civil 3d
Autodesk infraworks
Autodesk inventor
Autodesk revit
Autodesk revit Lt
Autodesk shared Components
Autodesk vault
CPEs cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*
cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*
Vendors & Products Autodesk 3ds Max
Autodesk advance Steel
Autodesk autocad
Autodesk autocad Architecture
Autodesk autocad Electrical
Autodesk autocad Map 3d
Autodesk autocad Mechanical
Autodesk autocad Mep
Autodesk autocad Plant 3d
Autodesk civil 3d
Autodesk infraworks
Autodesk inventor
Autodesk revit
Autodesk revit Lt
Autodesk shared Components
Autodesk vault

Wed, 30 Jul 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Autodesk
Autodesk autodesk
Vendors & Products Autodesk
Autodesk autodesk

Tue, 29 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 29 Jul 2025 18:00:00 +0000

Type Values Removed Values Added
Description A maliciously crafted PRT file, when linked or imported into certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
Title PRT File Parsing Out-of-Bounds Read Vulnerability
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: autodesk

Published: 2025-07-29T17:53:35.895Z

Updated: 2025-07-30T03:55:52.940Z

Reserved: 2025-06-25T13:44:26.482Z

Link: CVE-2025-6635

cve-icon Vulnrichment

Updated: 2025-07-29T18:31:03.611Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-29T18:15:32.170

Modified: 2025-08-04T14:09:39.387

Link: CVE-2025-6635

cve-icon Redhat

No data.