Skip to main content

CVE-2025-0831: CWE-125 Out-of-bounds Read in Dassault Systèmes SOLIDWORKS eDrawings

High
VulnerabilityCVE-2025-0831cvecve-2025-0831cwe-125
Published: Tue Jul 15 2025 (07/15/2025, 15:00:10 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: SOLIDWORKS eDrawings

Description

Out-Of-Bounds Read vulnerability exists in the JT file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted JT file.

AI-Powered Analysis

AILast updated: 07/22/2025, 20:52:08 UTC

Technical Analysis

CVE-2025-0831 is a high-severity out-of-bounds read vulnerability (CWE-125) identified in Dassault Systèmes' SOLIDWORKS eDrawings software, specifically affecting the JT file reading procedure in the Release SOLIDWORKS Desktop 2025 SP0 version. The vulnerability arises when the software processes specially crafted JT files, which are a common 3D data format used in CAD and product lifecycle management workflows. An out-of-bounds read occurs when the program reads data beyond the allocated buffer boundaries, potentially leading to memory corruption. In this case, the vulnerability can be exploited to execute arbitrary code on the victim’s machine when a malicious JT file is opened. The CVSS 3.1 base score of 7.8 reflects a high severity level, with an attack vector classified as local (AV:L), requiring low attack complexity (AC:L), no privileges (PR:N), but user interaction (UI:R) is necessary to open the malicious file. The impact on confidentiality, integrity, and availability is rated high, indicating that successful exploitation could lead to full system compromise. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting the vulnerability is newly disclosed. The vulnerability affects a widely used engineering visualization tool, which is integral in design and manufacturing processes, making it a critical concern for organizations relying on SOLIDWORKS eDrawings for CAD data review and collaboration.

Potential Impact

For European organizations, the impact of CVE-2025-0831 is significant, particularly for industries heavily reliant on CAD software such as automotive, aerospace, manufacturing, and engineering services. Compromise of SOLIDWORKS eDrawings could lead to unauthorized code execution, resulting in intellectual property theft, sabotage of design data, or disruption of engineering workflows. This could cause delays in product development, financial losses, and damage to reputation. Given the high confidentiality and integrity impact, sensitive design files could be exfiltrated or altered, potentially affecting product safety and compliance with regulatory standards. The requirement for local access and user interaction means that phishing or social engineering attacks could be used to trick employees into opening malicious JT files, making internal security awareness critical. The lack of current known exploits provides a window for proactive mitigation, but organizations must act swiftly to prevent exploitation once patches become available.

Mitigation Recommendations

1. Immediate mitigation should include restricting the opening of JT files from untrusted or unknown sources until a patch is released. 2. Implement strict email filtering and endpoint protection to detect and block suspicious JT files or attachments. 3. Educate users, especially engineers and designers, about the risks of opening unsolicited or unexpected JT files and encourage verification of file sources. 4. Employ application whitelisting and sandboxing techniques to isolate SOLIDWORKS eDrawings processes, limiting the impact of potential exploitation. 5. Monitor system logs and network traffic for unusual activity related to SOLIDWORKS eDrawings usage. 6. Once Dassault Systèmes releases a security patch, prioritize its deployment across all affected systems. 7. Consider network segmentation to separate engineering workstations from other critical infrastructure to contain potential breaches. 8. Maintain up-to-date backups of design files and system states to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
3DS
Date Reserved
2025-01-29T12:04:23.816Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687670b9a83201eaaccf4d5a

Added to database: 7/15/2025, 3:16:09 PM

Last enriched: 7/22/2025, 8:52:08 PM

Last updated: 8/30/2025, 4:35:41 PM

Views: 597

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats