CVE-2026-0536
Published: 04 February 2026
Summary
CVE-2026-0536 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Autodesk 3Ds Max. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 0.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the stack-based buffer overflow in Autodesk 3ds Max by requiring timely application of vendor patches as referenced in security advisory ADSK-SA-2026-0002.
Implements memory safeguards such as stack canaries, ASLR, and DEP to prevent arbitrary code execution from stack buffer overflows during GIF parsing.
Requires validation of untrusted GIF file inputs to detect and reject malformed data that could trigger the buffer overflow vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow in client software (3ds Max) triggered by opening a crafted GIF file directly enables exploitation for client-side code execution via malicious file.
NVD Description
A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
Deeper analysisAI
CVE-2026-0536 is a stack-based buffer overflow vulnerability (CWE-787) affecting Autodesk 3ds Max. The issue arises when the software parses a maliciously crafted GIF file, which can trigger the overflow and enable a malicious actor to execute arbitrary code in the context of the current process. Published on 2026-02-04, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
An attacker with local access can exploit this vulnerability by tricking a user into opening the malicious GIF file within Autodesk 3ds Max, requiring low attack complexity and user interaction but no special privileges. Successful exploitation allows arbitrary code execution, resulting in high impacts to confidentiality, integrity, and availability within the user context.
Autodesk has published security advisory ADSK-SA-2026-0002, available at https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0002, which provides details on mitigation and patches. Additional product information is referenced at https://www.autodesk.com/products/autodesk-access/overview.
Details
- CWE(s)