CVE-2025-1649
Published: 13 March 2025
Summary
CVE-2025-1649 is a high-severity Use of Uninitialized Variable (CWE-457) vulnerability in Autodesk Autocad. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 43.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2025-1649 by requiring timely application of Autodesk patches that fix the uninitialized variable vulnerability in CATPRODUCT file parsing.
Implements memory protections such as DEP and ASLR to prevent arbitrary code execution and sensitive data disclosure from exploitation of the uninitialized variable.
Requires validation of information inputs like CATPRODUCT files to block maliciously crafted data from triggering the uninitialized variable vulnerability during parsing.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a client-side uninitialized variable flaw in AutoCAD triggered by parsing a malicious CATPRODUCT file, directly enabling exploitation for client execution (T1203) via user opening of a malicious file (T1204.002) leading to RCE, memory disclosure, or DoS.
NVD Description
A maliciously crafted CATPRODUCT file, when parsed through Autodesk AutoCAD, can force an Uninitialized Variable vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current…
more
process.
Deeper analysisAI
CVE-2025-1649 is an uninitialized variable vulnerability (CWE-457, CWE-908) affecting Autodesk AutoCAD. The issue arises when AutoCAD parses a maliciously crafted CATPRODUCT file, which can trigger the flaw. Published on 2025-03-13, it has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
A local attacker can exploit this vulnerability by convincing a user to open a specially crafted CATPRODUCT file in AutoCAD, requiring no privileges but relying on user interaction. Successful exploitation allows the attacker to cause a denial-of-service condition via application crash, read sensitive data from memory, or execute arbitrary code within the context of the AutoCAD process.
Autodesk has published security advisory ADSK-SA-2025-0001 addressing this issue. Mitigation involves applying the latest updates for AutoCAD, available through Autodesk Access or specific download pages for versions such as AutoCAD and AutoCAD LT 2022.
Details
- CWE(s)