Impact
Autodesk can load USD files in its 3ds Max and Arnold products, and a specially crafted file triggers an out‑of‑bounds write that can be abused to execute arbitrary code in the process’s context. The vulnerability is a classic out‑of‑bounds write (CWE‑787) that provides the attacker with full control over the execution flow of a vulnerable instance. It does not require any network connectivity; the malicious USD file must be processed locally during import or loading.
Affected Systems
The affected software is Autodesk 3ds Max 2026.2, Autodesk Arnold 7.4.4.2, and USD for Arnold 7.4.4.1. These versions are listed in the CPE data. Any user who can load a USD file into one of these applications on a system where these versions are installed is susceptible.
Risk and Exploitability
The CVSS score of 7.8 reflects a high impact when the vulnerability is successfully triggered. The EPSS score of less than 1% indicates that, as of the last measurement, exploitation is unlikely to be widespread, but it is still possible, especially within specialized production environments where USD files are manipulated. The vulnerability is not currently in the CISA KEV catalog. Because the attack only requires a user to import a file, the primary attack vector is local, though a compromised user or remotely controlled file import scenario could also be used. Once the out‑of‑bounds write occurs, an attacker can run arbitrary code with the privileges of the application process, potentially leading to system compromise.
OpenCVE Enrichment