Cyber Posture

CVE-2025-1431

High

Published: 13 March 2025

Published
13 March 2025
Modified
19 August 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0038 59.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user opening a malicious file in order to gain execution.

Security Summary

CVE-2025-1431 is an Out-of-Bounds Read vulnerability (CWE-125) affecting Autodesk AutoCAD. The issue arises when AutoCAD parses a maliciously crafted SLDPRT file, potentially leading to a crash, disclosure of sensitive data, or arbitrary code execution in the context of the current process. Published on 2025-03-13, it has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

An attacker with local access can exploit this vulnerability by tricking a user into opening a specially crafted SLDPRT file in AutoCAD, requiring no privileges but relying on user interaction. Successful exploitation enables high-impact outcomes, including reading sensitive memory contents, modifying process behavior through code execution, or causing application denial of service via crashes, all within the user's process context.

Autodesk's security advisory (ADSK-SA-2025-0001) addresses the vulnerability, with patches and updates available through their support resources, such as the latest AutoCAD and AutoCAD LT 2022 downloads. Security practitioners should advise users to apply these updates promptly via Autodesk Access or the provided support articles.

Details

CWE(s)
CWE-125

Affected Products

autodesk
autocad
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
autocad architecture
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
autocad electrical
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
autocad mechanical
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
autocad mep
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
autocad plant 3d
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
civil 3d
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
advance steel
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
autocad map 3d
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

The vulnerability is a client-side file parsing flaw in AutoCAD triggered by opening a malicious SLDPRT file, directly enabling exploitation for client code execution (T1203) via user execution of a malicious file (T1204.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References