CVE-2025-6636

A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*
OR cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*
cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*

History

04 Aug 2025, 14:09

Type Values Removed Values Added
First Time Autodesk infraworks
Autodesk autocad
Autodesk civil 3d
Autodesk revit Lt
Autodesk 3ds Max
Autodesk autocad Electrical
Autodesk
Autodesk autocad Mechanical
Autodesk autocad Architecture
Autodesk autocad Map 3d
Autodesk shared Components
Autodesk inventor
Autodesk vault
Autodesk autocad Mep
Autodesk advance Steel
Autodesk revit
Autodesk autocad Plant 3d
References () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015 - () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015 - Vendor Advisory
CPE cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*

31 Jul 2025, 18:42

Type Values Removed Values Added
Summary
  • (es) Un archivo PRT manipulado con fines maliciosos, al analizarse mediante ciertos productos de Autodesk, puede generar una vulnerabilidad de uso después de la liberación. Un agente malicioso puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar código arbitrario en el contexto del proceso actual.

29 Jul 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-29 18:15

Updated : 2025-08-04 14:09


NVD link : CVE-2025-6636

Mitre link : CVE-2025-6636

CVE.ORG link : CVE-2025-6636


JSON object : View

Products Affected

autodesk

  • shared_components
  • autocad_map_3d
  • 3ds_max
  • autocad_mep
  • autocad_plant_3d
  • autocad_architecture
  • infraworks
  • autocad_mechanical
  • revit
  • advance_steel
  • autocad
  • revit_lt
  • vault
  • civil_3d
  • autocad_electrical
  • inventor
CWE
CWE-416

Use After Free