CVE-2025-1884: CWE-416 Use After Free in Dassault Systèmes SOLIDWORKS eDrawings
Use-After-Free vulnerability exists in the SLDPRT file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted SLDPRT file.
AI Analysis
Technical Summary
CVE-2025-1884 is a high-severity Use-After-Free (CWE-416) vulnerability identified in Dassault Systèmes SOLIDWORKS eDrawings, specifically affecting the Release SOLIDWORKS Desktop 2025 SP0 version. The vulnerability arises in the SLDPRT file reading procedure, where improper memory management leads to a Use-After-Free condition. This flaw allows an attacker to craft a malicious SLDPRT file that, when opened by a user in the vulnerable eDrawings application, can trigger arbitrary code execution. The vulnerability requires local access to the system (Attack Vector: Local) and user interaction (opening the malicious file). No privileges are required to exploit the vulnerability, and the attack complexity is low, meaning exploitation is feasible without specialized conditions. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution could lead to full system compromise, data theft, or disruption of services. Although no known exploits are currently reported in the wild, the high CVSS score of 7.8 reflects the significant risk posed by this vulnerability. The absence of a patch at the time of publication increases the urgency for mitigation. The vulnerability affects a widely used CAD file viewer in engineering and design environments, which often handle sensitive intellectual property and critical design data.
Potential Impact
For European organizations, especially those in manufacturing, automotive, aerospace, and engineering sectors, this vulnerability poses a substantial risk. SOLIDWORKS eDrawings is commonly used across Europe for viewing and sharing CAD files, including SLDPRT files that contain detailed 3D part designs. Exploitation could lead to unauthorized code execution on workstations, potentially resulting in theft or manipulation of proprietary design data, disruption of design workflows, and compromise of networked environments. Given the critical role of CAD tools in product development and industrial operations, successful exploitation could have cascading effects on supply chains and intellectual property protection. Additionally, the vulnerability could be leveraged in targeted attacks against European organizations with high-value engineering assets, impacting confidentiality and operational integrity. The requirement for user interaction (opening a malicious file) suggests phishing or social engineering could be vectors, increasing the risk in environments with less stringent user awareness or file handling policies.
Mitigation Recommendations
1. Implement strict file handling policies: Restrict the opening of SLDPRT files from untrusted or unknown sources, especially via email or external media. 2. Employ sandboxing or application isolation techniques for eDrawings to limit the impact of potential exploitation. 3. Use endpoint detection and response (EDR) solutions to monitor for suspicious behaviors related to eDrawings processes, such as unexpected memory operations or code injection attempts. 4. Educate users on the risks of opening unsolicited CAD files and enforce multi-factor authentication on systems handling sensitive design data to reduce lateral movement post-compromise. 5. Monitor Dassault Systèmes communications closely for patches or updates and prioritize rapid deployment once available. 6. Consider network segmentation to isolate engineering workstations from broader corporate networks to contain potential breaches. 7. Utilize file integrity monitoring on critical design files and audit logs to detect unauthorized modifications. 8. Where possible, employ application whitelisting to prevent execution of unauthorized code spawned by exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Czech Republic
CVE-2025-1884: CWE-416 Use After Free in Dassault Systèmes SOLIDWORKS eDrawings
Description
Use-After-Free vulnerability exists in the SLDPRT file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted SLDPRT file.
AI-Powered Analysis
Technical Analysis
CVE-2025-1884 is a high-severity Use-After-Free (CWE-416) vulnerability identified in Dassault Systèmes SOLIDWORKS eDrawings, specifically affecting the Release SOLIDWORKS Desktop 2025 SP0 version. The vulnerability arises in the SLDPRT file reading procedure, where improper memory management leads to a Use-After-Free condition. This flaw allows an attacker to craft a malicious SLDPRT file that, when opened by a user in the vulnerable eDrawings application, can trigger arbitrary code execution. The vulnerability requires local access to the system (Attack Vector: Local) and user interaction (opening the malicious file). No privileges are required to exploit the vulnerability, and the attack complexity is low, meaning exploitation is feasible without specialized conditions. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution could lead to full system compromise, data theft, or disruption of services. Although no known exploits are currently reported in the wild, the high CVSS score of 7.8 reflects the significant risk posed by this vulnerability. The absence of a patch at the time of publication increases the urgency for mitigation. The vulnerability affects a widely used CAD file viewer in engineering and design environments, which often handle sensitive intellectual property and critical design data.
Potential Impact
For European organizations, especially those in manufacturing, automotive, aerospace, and engineering sectors, this vulnerability poses a substantial risk. SOLIDWORKS eDrawings is commonly used across Europe for viewing and sharing CAD files, including SLDPRT files that contain detailed 3D part designs. Exploitation could lead to unauthorized code execution on workstations, potentially resulting in theft or manipulation of proprietary design data, disruption of design workflows, and compromise of networked environments. Given the critical role of CAD tools in product development and industrial operations, successful exploitation could have cascading effects on supply chains and intellectual property protection. Additionally, the vulnerability could be leveraged in targeted attacks against European organizations with high-value engineering assets, impacting confidentiality and operational integrity. The requirement for user interaction (opening a malicious file) suggests phishing or social engineering could be vectors, increasing the risk in environments with less stringent user awareness or file handling policies.
Mitigation Recommendations
1. Implement strict file handling policies: Restrict the opening of SLDPRT files from untrusted or unknown sources, especially via email or external media. 2. Employ sandboxing or application isolation techniques for eDrawings to limit the impact of potential exploitation. 3. Use endpoint detection and response (EDR) solutions to monitor for suspicious behaviors related to eDrawings processes, such as unexpected memory operations or code injection attempts. 4. Educate users on the risks of opening unsolicited CAD files and enforce multi-factor authentication on systems handling sensitive design data to reduce lateral movement post-compromise. 5. Monitor Dassault Systèmes communications closely for patches or updates and prioritize rapid deployment once available. 6. Consider network segmentation to isolate engineering workstations from broader corporate networks to contain potential breaches. 7. Utilize file integrity monitoring on critical design files and audit logs to detect unauthorized modifications. 8. Where possible, employ application whitelisting to prevent execution of unauthorized code spawned by exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- 3DS
- Date Reserved
- 2025-03-03T12:31:58.250Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9838c4522896dcbebf9e
Added to database: 5/21/2025, 9:09:12 AM
Last enriched: 6/25/2025, 11:42:17 PM
Last updated: 8/1/2025, 2:59:09 AM
Views: 14
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.