Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7992: CWE-125: Out-of-bounds Read in Ashlar-Vellum Cobalt

0
High
VulnerabilityCVE-2025-7992cvecve-2025-7992cwe-125
Published: Wed Sep 17 2025 (09/17/2025, 20:52:22 UTC)
Source: CVE Database V5
Vendor/Project: Ashlar-Vellum
Product: Cobalt

Description

Ashlar-Vellum Cobalt AR File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25972.

AI-Powered Analysis

AILast updated: 09/25/2025, 00:50:02 UTC

Technical Analysis

CVE-2025-7992 is a high-severity vulnerability affecting Ashlar-Vellum Cobalt version 12 SP1, specifically in the AR file parsing component. The root cause is an out-of-bounds read (CWE-125) due to improper validation of user-supplied data when parsing AR files. This flaw allows an attacker to read beyond the allocated memory buffer, which can lead to remote code execution (RCE) within the context of the current process. Exploitation requires user interaction, such as opening a maliciously crafted AR file or visiting a malicious webpage that triggers the vulnerable parser. The vulnerability does not require prior authentication and has a CVSS 3.0 base score of 7.8, indicating high severity. The attack vector is local (AV:L), meaning the attacker must have some level of access to deliver the malicious file or link, but no privileges are required (PR:N). The vulnerability impacts confidentiality, integrity, and availability (all rated high), as arbitrary code execution can lead to full compromise of the affected system. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability was assigned by the Zero Day Initiative (ZDI) under ZDI-CAN-25972 and publicly disclosed in September 2025.

Potential Impact

For European organizations using Ashlar-Vellum Cobalt 12 SP1, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to data theft, system compromise, or disruption of critical design and engineering workflows. Given that Ashlar-Vellum Cobalt is specialized CAD software, organizations in sectors such as manufacturing, engineering, architecture, and product design are particularly at risk. Compromise of these systems could result in intellectual property theft, sabotage of design files, and operational downtime. The requirement for user interaction means phishing or social engineering campaigns could be effective attack vectors, increasing the risk in environments with less stringent user awareness training. The high impact on confidentiality, integrity, and availability underscores the critical nature of this vulnerability for organizations relying on this software for sensitive or mission-critical design processes.

Mitigation Recommendations

Organizations should immediately identify and inventory all installations of Ashlar-Vellum Cobalt 12 SP1 within their environment. Until a vendor patch is available, implement strict controls on the handling of AR files, including disabling automatic opening or previewing of AR files in email clients and browsers. Employ application whitelisting and sandboxing techniques to isolate the Cobalt application and limit the impact of potential exploitation. Enhance user awareness training focused on recognizing phishing attempts and suspicious files, emphasizing the risks of opening unsolicited AR files. Network segmentation can reduce exposure by limiting access to systems running the vulnerable software. Monitor logs and endpoint detection systems for unusual activity related to the Cobalt process. Once a patch is released, prioritize immediate deployment. Additionally, consider implementing file integrity monitoring on critical design files to detect unauthorized modifications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-07-21T19:50:05.861Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68cb20e9c138e352740b9f71

Added to database: 9/17/2025, 8:58:17 PM

Last enriched: 9/25/2025, 12:50:02 AM

Last updated: 10/30/2025, 10:00:18 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats