A maliciously crafted file, when executed on the victim's machine, can lead to privilege escalation to NT AUTHORITY/SYSTEM due to an insufficient validation of loaded binaries. An attacker with local and low-privilege access could exploit this to execute code as SYSTEM.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 06 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 18:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-426

Thu, 06 Nov 2025 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-426

Thu, 06 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Description A maliciously crafted file, when executed on the victim's machine, can lead to privilege escalation to NT AUTHORITY/SYSTEM due to an insufficient validation of loaded binaries. An attacker with local and low-privilege access could exploit this to execute code as SYSTEM.
Title Privilege Escalation Vulnerability
First Time appeared Autodesk
Autodesk installer
Weaknesses CWE-250
CPEs cpe:2.3:a:autodesk:installer:2.18:*:*:*:*:*:*:*
Vendors & Products Autodesk
Autodesk installer
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: autodesk

Published:

Updated: 2025-11-06T17:58:04.357Z

Reserved: 2025-09-23T15:29:52.416Z

Link: CVE-2025-10885

cve-icon Vulnrichment

Updated: 2025-11-06T17:27:33.984Z

cve-icon NVD

Status : Received

Published: 2025-11-06T17:15:42.313

Modified: 2025-11-06T17:15:42.313

Link: CVE-2025-10885

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.