Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 12 Nov 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:autodesk:installer:*:*:*:*:*:*:*:* |
Thu, 06 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-426 |
Thu, 06 Nov 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-426 |
Thu, 06 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted file, when executed on the victim's machine, can lead to privilege escalation to NT AUTHORITY/SYSTEM due to an insufficient validation of loaded binaries. An attacker with local and low-privilege access could exploit this to execute code as SYSTEM. | |
| Title | Privilege Escalation Vulnerability | |
| First Time appeared |
Autodesk
Autodesk installer |
|
| Weaknesses | CWE-250 | |
| CPEs | cpe:2.3:a:autodesk:installer:2.18:*:*:*:*:*:*:* | |
| Vendors & Products |
Autodesk
Autodesk installer |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2026-02-26T17:47:10.529Z
Reserved: 2025-09-23T15:29:52.416Z
Link: CVE-2025-10885
Updated: 2025-11-06T17:27:33.984Z
Status : Analyzed
Published: 2025-11-06T17:15:42.313
Modified: 2025-11-12T14:34:48.237
Link: CVE-2025-10885
No data.
OpenCVE Enrichment
No data.