CVE-2025-7990: CWE-787: Out-of-bounds Write in Ashlar-Vellum Cobalt
Ashlar-Vellum Cobalt VC6 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25944.
AI Analysis
Technical Summary
CVE-2025-7990 is a high-severity vulnerability classified under CWE-787 (Out-of-bounds Write) affecting Ashlar-Vellum Cobalt version 12 SP1. The vulnerability arises from improper validation of user-supplied data during the parsing of VC6 files, which are presumably project or design files used by the Cobalt software. Specifically, the flaw allows an attacker to write data beyond the allocated bounds of a data structure, leading to memory corruption. This memory corruption can be exploited to execute arbitrary code within the context of the current process. Exploitation requires user interaction, such as opening a maliciously crafted VC6 file or visiting a malicious webpage that triggers the file parsing. The vulnerability does not require prior authentication but does require user action (UI:R). The CVSS v3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no public exploits are currently known, the nature of the vulnerability and its potential for remote code execution make it a significant threat to users of Ashlar-Vellum Cobalt 12 SP1. The vulnerability was reserved in July 2025 and published in September 2025, indicating recent discovery and disclosure. No patches or mitigations have been linked yet, so affected users must be vigilant. The vulnerability was identified by the Zero Day Initiative (ZDI) under ZDI-CAN-25944, which suggests it was responsibly disclosed.
Potential Impact
For European organizations using Ashlar-Vellum Cobalt 12 SP1, this vulnerability poses a serious risk. Successful exploitation could lead to full compromise of affected systems, allowing attackers to execute arbitrary code, potentially leading to data theft, sabotage, or lateral movement within networks. Given that Ashlar-Vellum Cobalt is specialized CAD/design software, organizations in engineering, manufacturing, architecture, and product design sectors are particularly at risk. Compromise of design files or intellectual property could result in significant financial loss and competitive disadvantage. Additionally, if exploited in a targeted attack, it could serve as an entry point for broader network intrusion. The requirement for user interaction means that social engineering or phishing campaigns could be used to deliver malicious files or links. The high confidentiality, integrity, and availability impacts mean that data breaches, data manipulation, or denial of service conditions could occur. European organizations with strict data protection regulations (e.g., GDPR) may face compliance and reputational consequences if this vulnerability is exploited.
Mitigation Recommendations
1. Immediate mitigation should include educating users about the risks of opening VC6 files from untrusted sources and avoiding visiting suspicious websites that could host malicious files. 2. Implement network-level protections such as email filtering and web content filtering to block malicious attachments or URLs related to VC6 files. 3. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts. 4. Restrict the use of Ashlar-Vellum Cobalt to trusted users and environments, and consider sandboxing or running the software with least privilege to limit the impact of potential exploitation. 5. Monitor vendor communications closely for patches or updates addressing CVE-2025-7990 and apply them promptly once available. 6. Conduct regular backups of critical design files and verify their integrity to enable recovery in case of compromise. 7. Use application whitelisting to prevent unauthorized execution of code spawned by exploitation attempts. 8. Review and tighten user interaction policies, such as disabling automatic file previews or downloads in email clients, to reduce the risk of inadvertent exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Czech Republic
CVE-2025-7990: CWE-787: Out-of-bounds Write in Ashlar-Vellum Cobalt
Description
Ashlar-Vellum Cobalt VC6 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25944.
AI-Powered Analysis
Technical Analysis
CVE-2025-7990 is a high-severity vulnerability classified under CWE-787 (Out-of-bounds Write) affecting Ashlar-Vellum Cobalt version 12 SP1. The vulnerability arises from improper validation of user-supplied data during the parsing of VC6 files, which are presumably project or design files used by the Cobalt software. Specifically, the flaw allows an attacker to write data beyond the allocated bounds of a data structure, leading to memory corruption. This memory corruption can be exploited to execute arbitrary code within the context of the current process. Exploitation requires user interaction, such as opening a maliciously crafted VC6 file or visiting a malicious webpage that triggers the file parsing. The vulnerability does not require prior authentication but does require user action (UI:R). The CVSS v3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no public exploits are currently known, the nature of the vulnerability and its potential for remote code execution make it a significant threat to users of Ashlar-Vellum Cobalt 12 SP1. The vulnerability was reserved in July 2025 and published in September 2025, indicating recent discovery and disclosure. No patches or mitigations have been linked yet, so affected users must be vigilant. The vulnerability was identified by the Zero Day Initiative (ZDI) under ZDI-CAN-25944, which suggests it was responsibly disclosed.
Potential Impact
For European organizations using Ashlar-Vellum Cobalt 12 SP1, this vulnerability poses a serious risk. Successful exploitation could lead to full compromise of affected systems, allowing attackers to execute arbitrary code, potentially leading to data theft, sabotage, or lateral movement within networks. Given that Ashlar-Vellum Cobalt is specialized CAD/design software, organizations in engineering, manufacturing, architecture, and product design sectors are particularly at risk. Compromise of design files or intellectual property could result in significant financial loss and competitive disadvantage. Additionally, if exploited in a targeted attack, it could serve as an entry point for broader network intrusion. The requirement for user interaction means that social engineering or phishing campaigns could be used to deliver malicious files or links. The high confidentiality, integrity, and availability impacts mean that data breaches, data manipulation, or denial of service conditions could occur. European organizations with strict data protection regulations (e.g., GDPR) may face compliance and reputational consequences if this vulnerability is exploited.
Mitigation Recommendations
1. Immediate mitigation should include educating users about the risks of opening VC6 files from untrusted sources and avoiding visiting suspicious websites that could host malicious files. 2. Implement network-level protections such as email filtering and web content filtering to block malicious attachments or URLs related to VC6 files. 3. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts. 4. Restrict the use of Ashlar-Vellum Cobalt to trusted users and environments, and consider sandboxing or running the software with least privilege to limit the impact of potential exploitation. 5. Monitor vendor communications closely for patches or updates addressing CVE-2025-7990 and apply them promptly once available. 6. Conduct regular backups of critical design files and verify their integrity to enable recovery in case of compromise. 7. Use application whitelisting to prevent unauthorized execution of code spawned by exploitation attempts. 8. Review and tighten user interaction policies, such as disabling automatic file previews or downloads in email clients, to reduce the risk of inadvertent exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2025-07-21T19:49:59.408Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68cb20e9c138e352740b9f6b
Added to database: 9/17/2025, 8:58:17 PM
Last enriched: 9/25/2025, 12:37:44 AM
Last updated: 10/30/2025, 1:20:45 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownCVE-2025-12466: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal Simple OAuth (OAuth2) & OpenID Connect
UnknownCVE-2025-12083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal CivicTheme Design System
UnknownCVE-2025-12082: CWE-863 Incorrect Authorization in Drupal CivicTheme Design System
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.