CVE-2025-1428
Published: 13 March 2025
Summary
CVE-2025-1428 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Autodesk Autocad. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 40.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely remediation of known flaws like this AutoCAD out-of-bounds read vulnerability through vendor patches provided in Autodesk advisory ADSK-SA-2025-0001.
Implements memory safeguards such as address space layout randomization and non-executable memory to mitigate out-of-bounds reads that could lead to information disclosure or code execution.
Deploys malicious code protection mechanisms on endpoints to scan and potentially block or detect maliciously crafted CATPART files before they trigger the vulnerability in AutoCAD.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a client-side file parsing flaw in AutoCAD allowing arbitrary code execution when a user opens a malicious CATPART file, directly enabling T1203 (Exploitation for Client Execution) and T1204.002 (Malicious File under User Execution).
NVD Description
A maliciously crafted CATPART file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current…
more
process.
Deeper analysisAI
CVE-2025-1428 is an Out-of-Bounds Read vulnerability (CWE-125) in Autodesk AutoCAD, triggered by parsing a maliciously crafted CATPART file. Published on 2025-03-13, it has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The flaw occurs during file processing, allowing potential exploitation within the application's context.
A local attacker with no privileges can exploit this vulnerability by tricking a user into opening a specially crafted CATPART file through AutoCAD, requiring user interaction. Successful exploitation enables the attacker to cause application crashes (high availability impact), read sensitive data from memory (high confidentiality impact), or execute arbitrary code (high integrity impact) in the context of the current process.
Autodesk has addressed this issue in security advisory ADSK-SA-2025-0001, available at https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001. Mitigation involves applying the latest updates for AutoCAD, with download instructions provided at https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html. Additional context on Autodesk Access is at https://www.autodesk.com/products/autodesk-access/overview.
Details
- CWE(s)