Skip to main content

CVE-2025-6974: CWE-457 Use of Uninitialized Variable in Dassault Systèmes SOLIDWORKS eDrawings

High
VulnerabilityCVE-2025-6974cvecve-2025-6974cwe-457
Published: Tue Jul 15 2025 (07/15/2025, 15:04:16 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: SOLIDWORKS eDrawings

Description

Use of Uninitialized Variable vulnerability exists in the JT file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted JT file.

AI-Powered Analysis

AILast updated: 07/15/2025, 15:31:31 UTC

Technical Analysis

CVE-2025-6974 is a high-severity vulnerability identified in Dassault Systèmes' SOLIDWORKS eDrawings software, specifically affecting the JT file reading procedure in the Release SOLIDWORKS Desktop 2025 SP0 version. The root cause is a Use of Uninitialized Variable (CWE-457) flaw, which occurs when the software processes specially crafted JT files. An uninitialized variable can lead to undefined behavior, including memory corruption, which attackers can exploit to execute arbitrary code. This means that by tricking a user into opening a maliciously crafted JT file, an attacker could gain control over the affected system, potentially executing code with the privileges of the user running the application. The CVSS v3.1 score of 7.8 reflects a high severity, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The impact on confidentiality, integrity, and availability is high, as arbitrary code execution can lead to data theft, system compromise, or denial of service. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations need to be vigilant and prepare mitigation strategies proactively. The vulnerability is specific to the JT file parsing component, which is a common CAD data exchange format used in engineering and manufacturing workflows.

Potential Impact

For European organizations, especially those in engineering, manufacturing, automotive, aerospace, and industrial design sectors that rely heavily on SOLIDWORKS eDrawings for CAD visualization and collaboration, this vulnerability poses a significant risk. Exploitation could lead to unauthorized code execution on workstations, potentially allowing attackers to steal intellectual property, disrupt design processes, or move laterally within corporate networks. Given the critical role of CAD data in product development and supply chains, a successful attack could cause operational downtime, financial losses, and damage to reputation. The requirement for local access and user interaction means phishing or social engineering campaigns delivering malicious JT files are likely attack vectors. The high impact on confidentiality and integrity is particularly concerning for organizations handling sensitive design data subject to strict regulatory compliance and export controls within Europe.

Mitigation Recommendations

Organizations should implement a multi-layered approach: 1) Restrict the opening of JT files from untrusted or unknown sources and educate users about the risks of opening unsolicited CAD files. 2) Employ application whitelisting and sandboxing techniques to isolate SOLIDWORKS eDrawings processes, limiting the impact of potential exploitation. 3) Monitor and control local access to workstations running the affected software to reduce the risk of local exploitation. 4) Maintain up-to-date backups of critical design data to enable recovery in case of compromise. 5) Engage with Dassault Systèmes for timely patches and apply them immediately upon release. 6) Use endpoint detection and response (EDR) solutions to detect anomalous behaviors indicative of exploitation attempts. 7) Implement network segmentation to limit lateral movement if a workstation is compromised. 8) Consider disabling JT file support temporarily if feasible until a patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
3DS
Date Reserved
2025-07-01T13:14:23.199Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687670b9a83201eaaccf4d54

Added to database: 7/15/2025, 3:16:09 PM

Last enriched: 7/15/2025, 3:31:31 PM

Last updated: 7/15/2025, 8:32:34 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats