Show plain JSON{"id": "CVE-2025-1274", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "psirt@autodesk.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2025-04-15T21:15:47.083", "references": [{"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0007", "tags": ["Vendor Advisory"], "source": "psirt@autodesk.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Secondary", "source": "psirt@autodesk.com", "description": [{"lang": "en", "value": "CWE-787"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-787"}]}], "descriptions": [{"lang": "en", "value": "A maliciously crafted RCS file, when parsed through Autodesk Revit, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."}, {"lang": "es", "value": "Un archivo RCS manipulado con fines maliciosos, al analizarse mediante Autodesk Revit, puede forzar una vulnerabilidad de escritura fuera de los l\u00edmites. Un agente malicioso podr\u00eda aprovechar esta vulnerabilidad para provocar un bloqueo, da\u00f1ar datos o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual."}], "lastModified": "2025-05-08T15:40:34.083", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EA52EB6-C7F7-4CAF-9932-6E434F6AF08F", "versionEndExcluding": "2023.1.7", "versionStartIncluding": "2023"}, {"criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F61D5DA-0CBA-4A14-8CD4-154FFE14E70C", "versionEndExcluding": "2024.3.2", "versionStartIncluding": "2024"}, {"criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4229BAB4-AE43-43E3-89ED-1E19445482E1", "versionEndExcluding": "2025.4.1", "versionStartIncluding": "2025"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@autodesk.com"}