A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the Autodesk Installer application. Exploitation of this vulnerability may lead to code execution.
History

Tue, 10 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Jun 2025 15:00:00 +0000

Type Values Removed Values Added
Description A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the Autodesk Installer application. Exploitation of this vulnerability may lead to code execution.
Title Privilege Ecalation due to Untrusted Search Path Vulnerability
Weaknesses CWE-426
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: autodesk

Published: 2025-06-10T14:50:15.088Z

Updated: 2025-06-12T03:55:18.781Z

Reserved: 2025-05-29T14:52:55.445Z

Link: CVE-2025-5335

cve-icon Vulnrichment

Updated: 2025-06-10T14:55:40.783Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-10T15:15:25.703

Modified: 2025-06-12T16:06:39.330

Link: CVE-2025-5335

cve-icon Redhat

No data.