CVE-2025-1883

7.8 HIGH

📋 TL;DR

An out-of-bounds write vulnerability in SOLIDWORKS eDrawings' OBJ file parser allows arbitrary code execution when opening malicious OBJ files. This affects users of SOLIDWORKS Desktop 2025 who open untrusted OBJ files through eDrawings. Attackers can achieve remote code execution with user interaction.

💻 Affected Systems

Products:
  • SOLIDWORKS eDrawings
Versions: SOLIDWORKS Desktop 2025
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to open a malicious OBJ file. eDrawings is typically installed with SOLIDWORKS or as standalone viewer.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary code execution with user privileges, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or malware installation when users open malicious OBJ files from untrusted sources.

🟢

If Mitigated

Limited impact if users only open trusted files and systems have application sandboxing or execution prevention controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious file. Memory corruption vulnerabilities in file parsers are commonly exploited.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patch version

Vendor Advisory: https://www.3ds.com/vulnerability/advisories

Restart Required: Yes

Instructions:

1. Check the vendor advisory for available patches
2. Download and install the latest SOLIDWORKS update
3. Restart the system
4. Verify eDrawings is updated

🔧 Temporary Workarounds

Block OBJ file extensions

windows

Prevent eDrawings from opening OBJ files via file association blocking

assoc .obj=
ftype OBJFile=

Application control policy

windows

Use Windows AppLocker or similar to restrict eDrawings execution to trusted paths

🧯 If You Can't Patch

  • Restrict user permissions to limit damage from code execution
  • Implement network segmentation to contain potential lateral movement

🔍 How to Verify

Check if Vulnerable:

Check SOLIDWORKS version in Help > About SOLIDWORKS. If version is 2025 and not patched, system is vulnerable.

Check Version:

In SOLIDWORKS: Help > About SOLIDWORKS

Verify Fix Applied:

Verify SOLIDWORKS version is updated beyond vulnerable 2025 release per vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected eDrawings process crashes
  • OBJ file access from unusual locations
  • Suspicious child processes spawned from eDrawings

Network Indicators:

  • Outbound connections from eDrawings to unknown IPs
  • Unusual network traffic following OBJ file opening

SIEM Query:

Process Creation where Parent Image contains 'eDrawings' AND (Command Line contains '.obj' OR Image contains suspicious patterns)

🔗 References

📤 Share & Export