A maliciously crafted DWG file, when parsed through Autodesk Revit, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
References
Link | Resource |
---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0005 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
08 May 2025, 15:40
Type | Values Removed | Values Added |
---|---|---|
First Time |
Autodesk
Autodesk revit |
|
CWE | CWE-787 | |
CPE | cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:* | |
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0005 - Vendor Advisory |
16 Apr 2025, 13:25
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Apr 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-15 21:15
Updated : 2025-05-08 15:40
NVD link : CVE-2025-2497
Mitre link : CVE-2025-2497
CVE.ORG link : CVE-2025-2497
JSON object : View
Products Affected
autodesk
- revit