CVE-2025-1430
Published: 13 March 2025
Summary
CVE-2025-1430 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Autodesk Autocad. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 47.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely remediation of identified flaws, directly requiring patching of the AutoCAD memory corruption vulnerability via Autodesk updates.
Implements memory safeguards like DEP and ASLR to block arbitrary code execution from memory corruption during SLDPRT file parsing in AutoCAD.
Deploys malicious code protection to scan and quarantine crafted SLDPRT files before user interaction in vulnerable AutoCAD instances.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Memory corruption in AutoCAD SLDPRT parser enables RCE on file open, mapping directly to client-side exploitation (T1203) and user execution of malicious file (T1204.002).
NVD Description
A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
Deeper analysisAI
CVE-2025-1430 is a memory corruption vulnerability (CWE-120, CWE-787) affecting Autodesk AutoCAD when parsing a maliciously crafted SLDPRT file. Published on 2025-03-13 with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), it allows a malicious actor to trigger the issue during file processing, potentially leading to arbitrary code execution in the context of the AutoCAD process.
The vulnerability requires local access to the target system with low attack complexity but demands user interaction, such as convincing a user to open the malicious SLDPRT file in AutoCAD. No privileges are needed beforehand. Successful exploitation enables the attacker to execute arbitrary code with the privileges of the current user running AutoCAD, potentially compromising the system through high impacts on confidentiality, integrity, and availability.
Autodesk has published security advisory ADSK-SA-2025-0001 addressing this issue, with updates available for AutoCAD and AutoCAD LT. Users can download the latest updates from Autodesk's support pages, such as those for AutoCAD 2022, via Autodesk Access.
Details
- CWE(s)