CVE-2025-1429
Published: 13 March 2025
Summary
CVE-2025-1429 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Autodesk Autocad. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 47.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, testing, and installation of software patches to remediate the heap-based buffer overflow vulnerability in AutoCAD as specified in Autodesk's security advisory.
Implements memory protection techniques such as ASLR and DEP to prevent exploitation of heap-based buffer overflows leading to code execution or data leakage.
Enables vulnerability scanning to identify systems running vulnerable versions of AutoCAD affected by CVE-2025-1429.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow in AutoCAD MODEL file parser directly enables client-side arbitrary code execution (T1203) when a user opens a malicious file (T1204.002).
NVD Description
A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current…
more
process.
Deeper analysisAI
CVE-2025-1429 is a heap-based buffer overflow vulnerability (CWE-122, CWE-787) affecting Autodesk AutoCAD. The issue arises when the software parses a maliciously crafted MODEL file, potentially leading to memory corruption. Published on 2025-03-13, it has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high impact with low attack complexity but requiring local access and user interaction.
An attacker can exploit this vulnerability by convincing a user to open a specially crafted MODEL file in AutoCAD on a local system. No special privileges are required, but the user must interact by loading the file. Successful exploitation allows the attacker to cause a denial-of-service via application crash, read sensitive data from memory, or execute arbitrary code within the context of the AutoCAD process.
Autodesk has addressed the vulnerability in security advisory ADSK-SA-2025-0001. Mitigation involves applying the latest updates available for AutoCAD and AutoCAD LT, downloadable from Autodesk's support pages.
Details
- CWE(s)