- Description
- A maliciously crafted PDF file, when parsed through Autodesk applications, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
- Source
- psirt@autodesk.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
🚨 CVE-2025-1277 🔴 HIGH (7.8) 🏢 Autodesk - Revit 🏗️ 2025 🔗 https://t.co/ULfcdQaGGH #CyberCron #VulnAlert #InfoSec https://t.co/3taQX2ssIh
@cybercronai
16 Apr 2025
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-1277 A maliciously crafted PDF file, when parsed through Autodesk applications, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerabilit… https://t.co/DhDqeGsVTi
@CVEnew
15 Apr 2025
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3EA52EB6-C7F7-4CAF-9932-6E434F6AF08F",
"versionEndExcluding": "2023.1.7",
"versionStartIncluding": "2023"
},
{
"criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5F61D5DA-0CBA-4A14-8CD4-154FFE14E70C",
"versionEndExcluding": "2024.3.2",
"versionStartIncluding": "2024"
},
{
"criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4229BAB4-AE43-43E3-89ED-1E19445482E1",
"versionEndExcluding": "2025.4.1",
"versionStartIncluding": "2025"
}
],
"operator": "OR"
}
]
}
]