7.8 CVE-2025-5047
A maliciously crafted DGN file, when parsed through Autodesk AutoCAD, can force an Uninitialized Variable vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
https://nvd.nist.gov/vuln/detail/CVE-2025-5047
Categories
CWE-457 : Use of Uninitialized Variable
In some languages such as C and C++, stack variables are not initialized by default. They generally contain junk data with the contents of stack memory before the function was invoked. An attacker can sometimes control or read these contents. In other languages or conditions, a variable that is not explicitly initialized can be given a default value that has security implications, depending on the logic of the program. The presence of an uninitialized variable can sometimes indicate a typographic error in the code.
References
psirt@autodesk.com
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autodesk:autocad_lt:2026:*:*:*:*:-:*:* | ||
| cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:* | ||
REMEDIATION
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
| No known exploits |
Other Nist (github, ...)
| Url |
|---|
| No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
