Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 12 Nov 2025 23:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:autodesk:installer:*:*:*:*:*:*:*:* |
Fri, 07 Nov 2025 03:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 07 Nov 2025 03:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-426 |
Fri, 07 Nov 2025 02:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-426 |
Fri, 07 Nov 2025 02:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted file, when executed on the victim's machine, can lead to privilege escalation to NT AUTHORITY/SYSTEM due to an insufficient validation of loaded binaries. An attacker with local and low-privilege access could exploit this to execute code as SYSTEM. | |
| Title | Privilege Escalation Vulnerability | |
| First Time appeared |
Autodesk
Autodesk installer |
|
| Weaknesses | CWE-250 | |
| CPEs | cpe:2.3:a:autodesk:installer:2.18:*:*:*:*:*:*:* | |
| Vendors & Products |
Autodesk
Autodesk installer |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2025-11-08T04:55:19.036Z
Reserved: 2025-09-23T15:29:52.416Z
Link: CVE-2025-10885
Updated: 2025-11-06T17:27:33.984Z
Status : Analyzed
Published: 2025-11-06T17:15:42.313
Modified: 2025-11-12T14:34:48.237
Link: CVE-2025-10885
No data.
OpenCVE Enrichment
No data.