A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
2025-07-29T18:15:32.550
2025-08-19T14:15:42.677
Modified
CVSSv3.1: 7.8 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | autodesk | shared_components | 2026.2 | Yes |
| Application | autodesk | 3ds_max | 2026 | No |
| Application | autodesk | advance_steel | 2026 | No |
| Application | autodesk | autocad | 2026 | No |
| Application | autodesk | autocad_architecture | 2026 | No |
| Application | autodesk | autocad_electrical | 2026 | No |
| Application | autodesk | autocad_map_3d | 2026 | No |
| Application | autodesk | autocad_mechanical | 2026 | No |
| Application | autodesk | autocad_mep | 2026 | No |
| Application | autodesk | autocad_plant_3d | 2026 | No |
| Application | autodesk | civil_3d | 2026 | No |
| Application | autodesk | infraworks | 2026 | No |
| Application | autodesk | inventor | 2026 | No |
| Application | autodesk | revit | 2026 | No |
| Application | autodesk | revit_lt | 2026 | No |
| Application | autodesk | vault | 2026 | No |