{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T20:09:35.986145800Z","vulnerabilities":[{"cve":{"id":"CVE-2025-1277","sourceIdentifier":"psirt@autodesk.com","published":"2025-04-15T21:15:47.443","lastModified":"2025-08-19T13:15:40.063","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A maliciously crafted PDF file, when parsed through Autodesk applications, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."},{"lang":"es","value":"Un archivo PDF manipulado con fines maliciosos, al analizarse mediante aplicaciones de Autodesk, puede generar una vulnerabilidad de corrupción de memoria. Un agente malicioso puede aprovechar esta vulnerabilidad para ejecutar código arbitrario en el contexto del proceso actual."}],"metrics":{"cvssMetricV31":[{"source":"psirt@autodesk.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@autodesk.com","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*","versionStartIncluding":"2023","versionEndExcluding":"2023.1.7","matchCriteriaId":"3EA52EB6-C7F7-4CAF-9932-6E434F6AF08F"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*","versionStartIncluding":"2024","versionEndExcluding":"2024.3.2","matchCriteriaId":"5F61D5DA-0CBA-4A14-8CD4-154FFE14E70C"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*","versionStartIncluding":"2025","versionEndExcluding":"2025.4.1","matchCriteriaId":"4229BAB4-AE43-43E3-89ED-1E19445482E1"}]}]}],"references":[{"url":"https://www.autodesk.com/products/autodesk-access/overview","source":"psirt@autodesk.com"},{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003","source":"psirt@autodesk.com","tags":["Vendor Advisory"]}]}}]}