{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T20:47:38.574","vulnerabilities":[{"cve":{"id":"CVE-2025-1274","sourceIdentifier":"psirt@autodesk.com","published":"2025-04-15T21:15:47.083","lastModified":"2025-08-19T13:15:39.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A maliciously crafted RCS file, when parsed through Autodesk Revit, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."},{"lang":"es","value":"Un archivo RCS manipulado con fines maliciosos, al analizarse mediante Autodesk Revit, puede forzar una vulnerabilidad de escritura fuera de los límites. Un agente malicioso podría aprovechar esta vulnerabilidad para provocar un bloqueo, dañar datos o ejecutar código arbitrario en el contexto del proceso actual."}],"metrics":{"cvssMetricV31":[{"source":"psirt@autodesk.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@autodesk.com","type":"Secondary","description":[{"lang":"en","value":"CWE-787"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*","versionStartIncluding":"2023","versionEndExcluding":"2023.1.7","matchCriteriaId":"3EA52EB6-C7F7-4CAF-9932-6E434F6AF08F"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*","versionStartIncluding":"2024","versionEndExcluding":"2024.3.2","matchCriteriaId":"5F61D5DA-0CBA-4A14-8CD4-154FFE14E70C"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*","versionStartIncluding":"2025","versionEndExcluding":"2025.4.1","matchCriteriaId":"4229BAB4-AE43-43E3-89ED-1E19445482E1"}]}]}],"references":[{"url":"https://www.autodesk.com/products/autodesk-access/overview","source":"psirt@autodesk.com"},{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0007","source":"psirt@autodesk.com","tags":["Vendor Advisory"]}]}}]}