Uncontrolled Memory Allocation in Autodesk Maya’s .usdc Loader Causing DoS
CVE-2025-4605 Published on June 11, 2025

USD File Parsing Memory Allocation Vulnerability
A maliciously crafted .usdc file, when loaded through Autodesk Maya, can force an uncontrolled memory allocation vulnerability. A malicious actor may leverage this vulnerability to cause a denial-of-service (DoS), or cause data corruption.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2025-4605 can be exploited with local system access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and a high impact on availability.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
HIGH

Weakness Type

What is a Stack Exhaustion Vulnerability?

The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.

CVE-2025-4605 has been classified to as a Stack Exhaustion vulnerability or weakness.


Products Associated with CVE-2025-4605

stack.watch emails you whenever new vulnerabilities are published in AutoDesk Maya or AutoDesk Universal Scene Description. Just hit a watch button to start following.

 
 

Affected Versions

Autodesk USD for Maya: Autodesk USD for 3ds Max: Autodesk Maya:

Exploit Probability

EPSS
0.04%
Percentile
12.89%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.