- Description
- A maliciously crafted RFA file, when linked or imported into Autodesk Revit, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
- Source
- psirt@autodesk.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- psirt@autodesk.com
- CWE-416
- Hype score
- Not currently trending
🛠️ Critical flaw in Autodesk Revit (CVE-2025-5036) lets attackers exploit malicious RFA files to execute arbitrary code, crash apps, or read sensitive data. Patch now if using Revit 2024–2026. Details: https://t.co/CRIp5wVgvV #CyberSecurity #Revit #CVE20255036 https://t.c
@threatsbank
3 Jun 2025
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️Actualizaciones de seguridad para Autodesk Revit ❗CVE-2025-5036 ➡️Más info: https://t.co/OoANWO8phq https://t.co/cR1KnrJeNB
@CERTpy
3 Jun 2025
122 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
CVE-2025-5036 Use-After-Free Vulnerability in Autodesk Revit via Malicious RFA File Import https://t.co/UNeIO1FpXm
@VulmonFeeds
2 Jun 2025
86 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-5036 A maliciously crafted RFA file, when linked or imported into Autodesk Revit, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability… https://t.co/wTNuQUKwGW
@CVEnew
2 Jun 2025
374 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes