CVE-2025-7977: CWE-125: Out-of-bounds Read in Ashlar-Vellum Cobalt
Ashlar-Vellum Cobalt LI File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of LI files. The issue results from the lack of proper validation of user-supplied data, which can result in a read before the start of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25354.
AI Analysis
Technical Summary
CVE-2025-7977 is a high-severity vulnerability affecting Ashlar-Vellum Cobalt version 1204.91, specifically in the parsing of LI files. The vulnerability is classified as an out-of-bounds read (CWE-125), where improper validation of user-supplied data leads to reading memory before the start of an allocated buffer. This memory corruption flaw can be exploited by remote attackers to execute arbitrary code within the context of the current process. Exploitation requires user interaction, such as opening a malicious LI file or visiting a crafted webpage that triggers the vulnerable parser. The vulnerability allows attackers to compromise confidentiality, integrity, and availability by executing code remotely without prior authentication. The CVSS v3.0 base score is 7.8, reflecting high impact and moderate exploit complexity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability was reserved in July 2025 and published in September 2025 by ZDI (ZDI-CAN-25354).
Potential Impact
For European organizations using Ashlar-Vellum Cobalt 1204.91, this vulnerability poses a significant risk. The ability for remote code execution through crafted LI files or malicious web content can lead to full system compromise, data theft, or disruption of critical design workflows. Given that Ashlar-Vellum Cobalt is a CAD software used in engineering, architecture, and manufacturing sectors, exploitation could result in intellectual property theft, sabotage of design files, or operational downtime. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to deliver the exploit. The high impact on confidentiality, integrity, and availability could affect sensitive projects and critical infrastructure development within European industries, potentially causing financial and reputational damage.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict the use of Ashlar-Vellum Cobalt 1204.91 to trusted environments and limit exposure to untrusted LI files or web content. 2) Employ application whitelisting and sandboxing techniques to contain the execution context of Ashlar-Vellum Cobalt, preventing arbitrary code execution from impacting the broader system. 3) Educate users on the risks of opening files from unverified sources and implement strict email and web filtering to block malicious attachments or links. 4) Monitor network and endpoint behavior for anomalies indicative of exploitation attempts, such as unexpected process spawning or memory access violations. 5) Coordinate with Ashlar-Vellum for timely patch deployment once available and consider temporary disabling of LI file parsing features if feasible. 6) Use endpoint detection and response (EDR) solutions to detect and respond to suspicious activities related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Czech Republic
CVE-2025-7977: CWE-125: Out-of-bounds Read in Ashlar-Vellum Cobalt
Description
Ashlar-Vellum Cobalt LI File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of LI files. The issue results from the lack of proper validation of user-supplied data, which can result in a read before the start of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25354.
AI-Powered Analysis
Technical Analysis
CVE-2025-7977 is a high-severity vulnerability affecting Ashlar-Vellum Cobalt version 1204.91, specifically in the parsing of LI files. The vulnerability is classified as an out-of-bounds read (CWE-125), where improper validation of user-supplied data leads to reading memory before the start of an allocated buffer. This memory corruption flaw can be exploited by remote attackers to execute arbitrary code within the context of the current process. Exploitation requires user interaction, such as opening a malicious LI file or visiting a crafted webpage that triggers the vulnerable parser. The vulnerability allows attackers to compromise confidentiality, integrity, and availability by executing code remotely without prior authentication. The CVSS v3.0 base score is 7.8, reflecting high impact and moderate exploit complexity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability was reserved in July 2025 and published in September 2025 by ZDI (ZDI-CAN-25354).
Potential Impact
For European organizations using Ashlar-Vellum Cobalt 1204.91, this vulnerability poses a significant risk. The ability for remote code execution through crafted LI files or malicious web content can lead to full system compromise, data theft, or disruption of critical design workflows. Given that Ashlar-Vellum Cobalt is a CAD software used in engineering, architecture, and manufacturing sectors, exploitation could result in intellectual property theft, sabotage of design files, or operational downtime. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to deliver the exploit. The high impact on confidentiality, integrity, and availability could affect sensitive projects and critical infrastructure development within European industries, potentially causing financial and reputational damage.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict the use of Ashlar-Vellum Cobalt 1204.91 to trusted environments and limit exposure to untrusted LI files or web content. 2) Employ application whitelisting and sandboxing techniques to contain the execution context of Ashlar-Vellum Cobalt, preventing arbitrary code execution from impacting the broader system. 3) Educate users on the risks of opening files from unverified sources and implement strict email and web filtering to block malicious attachments or links. 4) Monitor network and endpoint behavior for anomalies indicative of exploitation attempts, such as unexpected process spawning or memory access violations. 5) Coordinate with Ashlar-Vellum for timely patch deployment once available and consider temporary disabling of LI file parsing features if feasible. 6) Use endpoint detection and response (EDR) solutions to detect and respond to suspicious activities related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2025-07-21T19:49:07.609Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68cb20e8c138e352740b9f26
Added to database: 9/17/2025, 8:58:16 PM
Last enriched: 9/17/2025, 9:00:17 PM
Last updated: 9/18/2025, 12:41:12 PM
Views: 5
Related Threats
CVE-2025-10035: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Fortra GoAnywhere MFT
CriticalCVE-2025-59220: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows Server 2022
HighCVE-2025-59216: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows Server 2025 (Server Core installation)
HighCVE-2025-59215: CWE-416: Use After Free in Microsoft Windows Server 2025 (Server Core installation)
HighCVE-2025-54754: CWE-259 in Cognex In-Sight 2000 series
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.