Cyber Posture

CVE-2025-1651

High

Published: 13 March 2025

Published
13 March 2025
Modified
19 August 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0029 52.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user opening a malicious file in order to gain execution.

Security Summary

CVE-2025-1651 is a heap-based overflow vulnerability (CWE-122, CWE-787) in Autodesk AutoCAD, triggered by parsing a maliciously crafted MODEL file. The issue allows potential crashes, sensitive data exposure, or arbitrary code execution within the context of the affected process. It has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high impact with local access, low attack complexity, no privileges required, and user interaction needed.

A local attacker can exploit this vulnerability by convincing a user to open a specially crafted MODEL file in AutoCAD. Successful exploitation enables the attacker to cause application crashes, read sensitive information from memory, or execute arbitrary code with the privileges of the current user running AutoCAD, potentially leading to further system compromise if elevated privileges are present.

Autodesk's security advisory (ADSK-SA-2025-0001) addresses the issue, with patches available through the latest updates for AutoCAD and AutoCAD LT, including downloads for versions such as 2022 as noted in support resources. Security practitioners should advise users to apply these updates promptly and avoid opening untrusted MODEL files.

Details

CWE(s)
CWE-122CWE-787

Affected Products

autodesk
autocad mechanical
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
autocad mep
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
autocad plant 3d
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
civil 3d
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
advance steel
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
autocad map 3d
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
autocad
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
autocad architecture
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7
autodesk
autocad electrical
2022 — 2022.1.6 · 2023 — 2023.1.7 · 2024 — 2024.1.7

MITRE ATT&CK Enterprise Techniques

T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

The vulnerability is a heap-based buffer overflow triggered specifically by parsing a maliciously crafted MODEL file in AutoCAD, requiring user interaction to open the file. This directly enables the Malicious File sub-technique under User Execution for achieving arbitrary code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References