A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://www.autodesk.com/products/autodesk-access/overview | patch product |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0017 | vendor advisory |