CVE-2025-1656

A maliciously crafted PDF file, when linked or imported into Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*

History

08 May 2025, 15:43

Type Values Removed Values Added
CPE cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*
References () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003 - () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003 - Vendor Advisory
CWE CWE-787
First Time Autodesk
Autodesk revit

16 Apr 2025, 13:25

Type Values Removed Values Added
Summary
  • (es) Un archivo PDF manipulado con fines maliciosos, al vincularse o importarse a aplicaciones de Autodesk, puede generar una vulnerabilidad de desbordamiento basado en montón. Un agente malicioso puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar código arbitrario en el contexto del proceso actual.

15 Apr 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-15 21:15

Updated : 2025-05-08 15:43


NVD link : CVE-2025-1656

Mitre link : CVE-2025-1656

CVE.ORG link : CVE-2025-1656


JSON object : View

Products Affected

autodesk

  • revit
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write