Skip to main content

CVE-2025-0831: CWE-125 Out-of-bounds Read in Dassault Systèmes SOLIDWORKS eDrawings

High
VulnerabilityCVE-2025-0831cvecve-2025-0831cwe-125
Published: Tue Jul 15 2025 (07/15/2025, 15:00:10 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: SOLIDWORKS eDrawings

Description

Out-Of-Bounds Read vulnerability exists in the JT file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted JT file.

AI-Powered Analysis

AILast updated: 07/15/2025, 15:31:08 UTC

Technical Analysis

CVE-2025-0831 is a high-severity out-of-bounds read vulnerability (CWE-125) identified in Dassault Systèmes' SOLIDWORKS eDrawings software, specifically in the JT file reading procedure of the Release SOLIDWORKS Desktop 2025 SP0 version. The vulnerability arises when the software processes specially crafted JT files, which are a common 3D data format used for product visualization and CAD data exchange. Exploitation of this vulnerability could allow an attacker to execute arbitrary code on the victim's system. The vulnerability is triggered during the parsing of JT files, where an out-of-bounds read can lead to memory corruption, potentially enabling code execution. The CVSS v3.1 score is 7.8, indicating a high level of severity. The attack vector is local (AV:L), requiring the attacker to have local access to the system, but no privileges (PR:N) are needed, and user interaction is required (UI:R), such as opening a malicious JT file. The impact on confidentiality, integrity, and availability is high, as arbitrary code execution can lead to full system compromise. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is particularly critical for organizations that use SOLIDWORKS eDrawings for CAD visualization and collaboration, as it could be exploited by malicious insiders or through social engineering to open malicious files. The vulnerability underscores the risks associated with processing complex file formats without sufficient bounds checking and input validation.

Potential Impact

For European organizations, the impact of CVE-2025-0831 could be significant, especially in industries relying heavily on CAD software such as automotive, aerospace, manufacturing, and engineering sectors. These industries often use SOLIDWORKS eDrawings for design review and collaboration. Successful exploitation could lead to unauthorized code execution, resulting in data theft, intellectual property compromise, disruption of design workflows, and potential sabotage of product development processes. Given the high confidentiality and integrity impact, attackers could exfiltrate sensitive design data or inject malicious code into design files, affecting downstream manufacturing or product quality. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, as attackers could deliver malicious JT files via phishing or insider threats. The lack of available patches increases exposure time, making timely mitigation critical. Additionally, the vulnerability could be leveraged in targeted attacks against European companies that are strategic suppliers or technology leaders, amplifying geopolitical risks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Restrict and monitor the use of SOLIDWORKS eDrawings to trusted users and environments, minimizing exposure to untrusted JT files. 2) Educate users on the risks of opening JT files from unknown or untrusted sources to reduce the likelihood of social engineering attacks. 3) Employ application whitelisting and sandboxing techniques to isolate SOLIDWORKS eDrawings processes, limiting the impact of potential exploitation. 4) Monitor file system and process behavior for anomalies indicative of exploitation attempts, such as unexpected memory access patterns or crashes during JT file processing. 5) Coordinate with Dassault Systèmes for timely patch deployment once available, and consider temporary use of alternative CAD viewers that do not process JT files until the vulnerability is resolved. 6) Implement network segmentation to limit lateral movement if a compromise occurs. 7) Use endpoint detection and response (EDR) tools to detect and respond to suspicious activities related to this vulnerability. These targeted actions go beyond generic advice by focusing on controlling JT file handling, user behavior, and process isolation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
3DS
Date Reserved
2025-01-29T12:04:23.816Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687670b9a83201eaaccf4d5a

Added to database: 7/15/2025, 3:16:09 PM

Last enriched: 7/15/2025, 3:31:08 PM

Last updated: 7/15/2025, 10:16:13 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats