Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9976: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dassault Systèmes Station Launcher App in 3DEXPERIENCE platform

0
Critical
VulnerabilityCVE-2025-9976cvecve-2025-9976cwe-78
Published: Mon Oct 13 2025 (10/13/2025, 07:33:15 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: Station Launcher App in 3DEXPERIENCE platform

Description

An OS Command Injection vulnerability affecting Station Launcher App in 3DEXPERIENCE platform from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x could allow an attacker to execute arbitrary code on the user's machine.

AI-Powered Analysis

AILast updated: 10/21/2025, 00:54:55 UTC

Technical Analysis

CVE-2025-9976 is an OS Command Injection vulnerability classified under CWE-78, affecting the Station Launcher App component of Dassault Systèmes' 3DEXPERIENCE platform from releases R2022x through R2025x. The vulnerability arises from improper neutralization of special characters in OS commands, allowing an attacker to inject and execute arbitrary commands on the underlying operating system. Exploitation requires the attacker to have limited privileges (PR:L) and necessitates user interaction (UI:R), such as convincing a user to perform an action that triggers the vulnerable command execution. The vulnerability has a CVSS v3.1 base score of 9.0, indicating critical severity with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially allowing system-wide compromise. Although no known exploits are reported in the wild, the vulnerability's nature and severity make it a high-risk threat. The 3DEXPERIENCE platform is widely used in industries requiring complex product lifecycle management (PLM), including aerospace, automotive, and manufacturing, where the Station Launcher App is a critical component for launching and managing software sessions. Attackers exploiting this vulnerability could gain arbitrary code execution on user machines, leading to data theft, sabotage, or lateral movement within networks.

Potential Impact

For European organizations, the impact of CVE-2025-9976 is significant due to the widespread adoption of Dassault Systèmes' 3DEXPERIENCE platform in key industrial sectors such as automotive, aerospace, manufacturing, and engineering. Successful exploitation could lead to full system compromise of user machines running the Station Launcher App, resulting in unauthorized access to sensitive intellectual property, disruption of engineering workflows, and potential sabotage of product development processes. The compromise of such systems could also facilitate lateral movement within corporate networks, increasing the risk of broader enterprise-wide breaches. Given the critical nature of the vulnerability and the high CVSS score, the potential for operational downtime, financial loss, and reputational damage is substantial. Additionally, the requirement for user interaction means phishing or social engineering attacks could be leveraged, increasing the attack surface. European organizations operating in sectors with high regulatory oversight and intellectual property sensitivity are particularly vulnerable to the confidentiality and integrity impacts of this vulnerability.

Mitigation Recommendations

Organizations should immediately prepare to apply patches from Dassault Systèmes once they become available, as no official patch links were provided at the time of this report. In the interim, implement strict input validation and sanitization on any user-supplied data that interacts with the Station Launcher App to reduce injection risks. Restrict user privileges to the minimum necessary to operate the platform, limiting the ability of attackers to execute commands with elevated rights. Educate users about the risks of social engineering and phishing attacks that could trigger the vulnerability. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious command execution attempts. Network segmentation should be enforced to contain potential lateral movement from compromised machines. Regularly audit and monitor logs for unusual activities related to the Station Launcher App. Coordinate with Dassault Systèmes support channels for updates and advisories. Finally, consider implementing multi-factor authentication and enhanced access controls around critical PLM systems to reduce exploitation likelihood.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
3DS
Date Reserved
2025-09-04T11:28:40.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ecae3d13a035d7a7575c20

Added to database: 10/13/2025, 7:46:05 AM

Last enriched: 10/21/2025, 12:54:55 AM

Last updated: 12/5/2025, 3:02:37 AM

Views: 152

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats