CVE-2025-6635

A maliciously crafted PRT file, when linked or imported into certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*
OR cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*
cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*

History

19 Aug 2025, 14:15

Type Values Removed Values Added
References
  • () https://www.autodesk.com/products/autodesk-access/overview -

04 Aug 2025, 14:09

Type Values Removed Values Added
References () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015 - () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015 - Vendor Advisory
CPE cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*
cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*
First Time Autodesk autocad Mechanical
Autodesk advance Steel
Autodesk autocad Electrical
Autodesk autocad Architecture
Autodesk 3ds Max
Autodesk vault
Autodesk autocad Mep
Autodesk
Autodesk revit
Autodesk infraworks
Autodesk inventor
Autodesk civil 3d
Autodesk shared Components
Autodesk revit Lt
Autodesk autocad Plant 3d
Autodesk autocad Map 3d
Autodesk autocad

31 Jul 2025, 18:42

Type Values Removed Values Added
Summary
  • (es) Un archivo PRT manipulado con fines maliciosos, al vincularse o importarse a ciertos productos de Autodesk, puede generar una vulnerabilidad de lectura fuera de los límites. Un agente malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar código arbitrario en el contexto del proceso actual.

29 Jul 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-29 18:15

Updated : 2025-08-19 14:15


NVD link : CVE-2025-6635

Mitre link : CVE-2025-6635

CVE.ORG link : CVE-2025-6635


JSON object : View

Products Affected

autodesk

  • advance_steel
  • autocad
  • autocad_plant_3d
  • autocad_mechanical
  • autocad_mep
  • infraworks
  • inventor
  • revit
  • vault
  • revit_lt
  • autocad_architecture
  • shared_components
  • autocad_map_3d
  • 3ds_max
  • civil_3d
  • autocad_electrical
CWE
CWE-125

Out-of-bounds Read