A maliciously crafted RFA, RTE, or RVT file, when parsed through Autodesk Revit, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
References
Link | Resource |
---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0012 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
22 Jul 2025, 16:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:* | |
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0012 - Vendor Advisory | |
First Time |
Autodesk
Autodesk revit |
14 Jul 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) A maliciously crafted RFA, RTE, or RVT file, when parsed through Autodesk Revit, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process. |
10 Jul 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-10 12:15
Updated : 2025-07-22 16:42
NVD link : CVE-2025-5037
Mitre link : CVE-2025-5037
CVE.ORG link : CVE-2025-5037
JSON object : View
Products Affected
autodesk
- revit
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')