Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 06 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-426 |
Thu, 06 Nov 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-426 |
Thu, 06 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted file, when executed on the victim's machine, can lead to privilege escalation to NT AUTHORITY/SYSTEM due to an insufficient validation of loaded binaries. An attacker with local and low-privilege access could exploit this to execute code as SYSTEM. | |
| Title | Privilege Escalation Vulnerability | |
| First Time appeared |
Autodesk
Autodesk installer |
|
| Weaknesses | CWE-250 | |
| CPEs | cpe:2.3:a:autodesk:installer:2.18:*:*:*:*:*:*:* | |
| Vendors & Products |
Autodesk
Autodesk installer |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2025-11-06T17:58:04.357Z
Reserved: 2025-09-23T15:29:52.416Z
Link: CVE-2025-10885
Updated: 2025-11-06T17:27:33.984Z
Status : Received
Published: 2025-11-06T17:15:42.313
Modified: 2025-11-06T17:15:42.313
Link: CVE-2025-10885
No data.
OpenCVE Enrichment
No data.