CVE-2025-5335

| EUVD-2025-17690 HIGH
2025-06-10 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17690
CVE Published
Jun 10, 2025 - 15:15 nvd
HIGH 7.8

Description

A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the Autodesk Installer application. Exploitation of this vulnerability may lead to code execution.

Analysis

Privilege escalation vulnerability in Autodesk Installer applications where a maliciously crafted binary file exploits an untrusted search path to achieve NT AUTHORITY/SYSTEM level code execution. The vulnerability requires local user interaction (file download) but no privileges, making it a significant risk for Windows environments running Autodesk products. While CVSS 7.8 indicates high severity, the local attack vector and required user interaction limit the attack surface compared to remote exploits.

Technical Context

This vulnerability stems from CWE-426 (Untrusted Search Path), a well-known class of privilege escalation flaws where applications search for dependencies or binaries in directories that an unprivileged attacker can modify. The Autodesk Installer application fails to validate the integrity or source of binary files during the installation or update process, allowing an attacker to place a malicious binary in a predictable search path (typically %PATH%, current directory, or application-specific directories). When the installer executes and searches for required binaries or libraries without absolute path validation or signature verification, it loads the attacker-controlled malicious binary instead of the legitimate one, executing arbitrary code with the elevated privileges (NT AUTHORITY/SYSTEM) that the installer process runs under. This is a classic DLL hijacking or path injection attack pattern common in Windows software.

Affected Products

Autodesk Installer application (specific version/product family not detailed in available data; likely affects multiple Autodesk products including AutoCAD, Revit, Fusion 360, and other tools that share the installer framework). Affected platforms: Windows systems running NT AUTHORITY/SYSTEM context installer processes. CPE information for specific Autodesk products would follow pattern: cpe:2.3:a:autodesk:*:*:*:*:*:*:*:*:* (awaiting vendor advisory for exact version constraints). Exploitation requires Windows filesystem access and ability to modify or inject into application search paths (typically requires local user access or network write permissions to shared application directories).

Remediation

1. **Immediate**: Autodesk should release patched installer versions that implement trusted search path validation (absolute paths), digital signature verification for loaded binaries, and manifest-based dependency loading. 2. **For End Users**: Update Autodesk applications and installers to the latest patched versions from Autodesk's official website or subscription portal. 3. **Workarounds** (pending patches): (a) Disable or remove write permissions on directories in the installer's search path for unprivileged users, (b) Run installers from isolated or read-only network shares where possible, (c) Use AppLocker or Code Integrity policies to whitelist only legitimate Autodesk binaries, (d) Educate users not to download installer executables from untrusted sources. 4. **Configuration**: Ensure installers run with minimal required privileges; disable auto-update features from untrusted sources. Patch references and vendor advisories should be sourced from Autodesk's official security bulletins (typically security.autodesk.com) once published.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +39
POC: 0

Share

CVE-2025-5335 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy