Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7980: CWE-787: Out-of-bounds Write in Ashlar-Vellum Graphite

0
High
VulnerabilityCVE-2025-7980cvecve-2025-7980cwe-787
Published: Wed Sep 17 2025 (09/17/2025, 20:51:28 UTC)
Source: CVE Database V5
Vendor/Project: Ashlar-Vellum
Product: Graphite

Description

Ashlar-Vellum Graphite VC6 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25465.

AI-Powered Analysis

AILast updated: 09/25/2025, 00:41:32 UTC

Technical Analysis

CVE-2025-7980 is a high-severity remote code execution vulnerability affecting Ashlar-Vellum Graphite version 13_SE_13048. The vulnerability arises from an out-of-bounds write condition (CWE-787) in the parsing of VC6 files, which are presumably project or design files handled by the Graphite software. Specifically, the flaw is due to improper validation of user-supplied data during the VC6 file parsing process, allowing an attacker to write beyond the allocated buffer boundaries. This memory corruption can be exploited to execute arbitrary code within the context of the current process. Exploitation requires user interaction, such as opening a maliciously crafted VC6 file or visiting a malicious webpage that triggers the file parsing. The CVSS v3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity, no privileges required, but user interaction necessary. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in July 2025 and published in September 2025, indicating recent discovery. The affected product, Ashlar-Vellum Graphite, is a CAD/design software used in technical and engineering fields, which makes this vulnerability particularly critical in environments where such files are exchanged or processed. The lack of proper input validation in file parsing is a common vector for remote code execution, and this vulnerability fits that pattern, allowing attackers to potentially compromise systems by tricking users into opening malicious files or visiting malicious sites hosting such files.

Potential Impact

For European organizations, the impact of CVE-2025-7980 can be significant, especially for those in engineering, manufacturing, architecture, and design sectors that rely on Ashlar-Vellum Graphite for CAD and design workflows. Successful exploitation could lead to full system compromise, data theft, or disruption of critical design processes. Confidentiality is at risk as attackers could access sensitive design files and intellectual property. Integrity is compromised because attackers could alter design files or software behavior. Availability is also threatened if attackers deploy ransomware or destructive payloads. Given the user interaction requirement, phishing or social engineering campaigns could be used to deliver malicious VC6 files. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially as attackers often develop exploits rapidly after disclosure. The lack of a patch at the time of publication means organizations must rely on mitigations until an official fix is released. This vulnerability could also be leveraged as a foothold in targeted attacks against high-value European industrial and engineering firms, potentially impacting supply chains and critical infrastructure projects.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict or monitor the receipt and opening of VC6 files from untrusted sources, including email attachments and downloads. 2) Employ application whitelisting and sandboxing to limit the execution context of Ashlar-Vellum Graphite and isolate it from sensitive system components. 3) Use endpoint detection and response (EDR) tools to monitor for anomalous behavior indicative of exploitation attempts, such as unexpected memory writes or process injections. 4) Educate users on the risks of opening files from unknown or suspicious origins, emphasizing the need for caution with VC6 files. 5) Network segmentation to limit the lateral movement potential if a system is compromised. 6) Regularly check for and apply vendor patches or updates once available. 7) Implement strict file scanning policies with advanced malware detection on mail gateways and file servers to detect malicious VC6 files. 8) Consider disabling or restricting the use of Ashlar-Vellum Graphite in environments where it is not essential until a patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-07-21T19:49:22.413Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68cb20e8c138e352740b9f2f

Added to database: 9/17/2025, 8:58:16 PM

Last enriched: 9/25/2025, 12:41:32 AM

Last updated: 11/2/2025, 9:03:33 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats