CVE-2025-1433
Published: 13 March 2025
Summary
CVE-2025-1433 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Autodesk Autocad. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 48.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely identification, reporting, and correction of software flaws like this out-of-bounds read vulnerability through vendor patches.
Implements memory protections such as address space randomization and non-executable memory to mitigate exploitation of out-of-bounds reads for code execution or data leakage.
Requires validation of information inputs like MODEL files to detect and reject maliciously crafted files before parsing in AutoCAD.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in AutoCAD file parsing (MODEL) is exploited via user opening malicious file leading to RCE or memory read, directly enabling T1203 (Exploitation for Client Execution) and T1204.002 (Malicious File).
NVD Description
A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current…
more
process.
Deeper analysisAI
CVE-2025-1433 is an Out-of-Bounds Read vulnerability (CWE-125) affecting Autodesk AutoCAD. The issue arises when AutoCAD parses a maliciously crafted MODEL file, potentially leading to exploitation. Published on 2025-03-13, it has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
A local attacker with no privileges can exploit this vulnerability by tricking a user into opening a malicious MODEL file in AutoCAD, which requires user interaction. Successful exploitation allows the attacker to cause a denial-of-service crash, read sensitive data from memory, or execute arbitrary code within the context of the AutoCAD process.
Autodesk's security advisory ADSK-SA-2025-0001 addresses this vulnerability. Mitigation involves applying the latest updates, available through Autodesk support resources such as the AutoCAD and AutoCAD LT 2022 update download page, with additional context provided in the Autodesk Access product overview.
Details
- CWE(s)