A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 22 Sep 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 22 Sep 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process. | |
Title | PRT File Parsing Memory Corruption Vulnerability | |
First Time appeared |
Autodesk
Autodesk shared Components |
|
Weaknesses | CWE-120 | |
CPEs | cpe:2.3:a:autodesk:shared_components:2026.4:*:*:*:*:*:*:* | |
Vendors & Products |
Autodesk
Autodesk shared Components |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2025-09-22T20:32:23.204Z
Reserved: 2025-08-12T15:50:17.780Z
Link: CVE-2025-8892

Updated: 2025-09-22T20:32:15.097Z

Status : Awaiting Analysis
Published: 2025-09-22T19:16:28.063
Modified: 2025-09-22T21:22:16.313
Link: CVE-2025-8892

No data.

No data.