CVE-2025-65084
📋 TL;DR
An Out-of-Bounds Write vulnerability in Ashlar-Vellum CAD software allows attackers to execute arbitrary code or disclose sensitive information by sending specially crafted files. This affects users of Cobalt, Xenon, Argon, Lithium, and Cobalt Share products. The high CVSS score indicates critical severity requiring immediate attention.
💻 Affected Systems
- Ashlar-Vellum Cobalt
- Ashlar-Vellum Xenon
- Ashlar-Vellum Argon
- Ashlar-Vellum Lithium
- Ashlar-Vellum Cobalt Share
📦 What is this software?
Argon by Ashlar
Cobalt by Ashlar
Lithium by Ashlar
Xenon by Ashlar
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with remote code execution leading to data theft, ransomware deployment, or lateral movement within networks.
Likely Case
Malicious actors deliver weaponized CAD files via phishing to execute code on victim systems, potentially stealing intellectual property or installing malware.
If Mitigated
With proper network segmentation and file validation, impact is limited to isolated systems without critical data access.
🎯 Exploit Status
Exploitation requires user interaction to open malicious files, but no authentication is needed once file is processed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 12.6.1204.208 or later
Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-329-01
Restart Required: Yes
Instructions:
1. Download latest version from Ashlar-Vellum website. 2. Backup current installation. 3. Run installer with administrative privileges. 4. Restart system after installation completes.
🔧 Temporary Workarounds
File Validation Filter
allImplement file validation to block suspicious CAD files at network perimeter.
Application Control
windowsRestrict execution of Ashlar-Vellum software to trusted users only.
🧯 If You Can't Patch
- Isolate affected systems from critical networks and internet access
- Implement strict file upload/download policies and user training against opening untrusted CAD files
🔍 How to Verify
Check if Vulnerable:
Check Help > About in Ashlar-Vellum software and verify version is 12.6.1204.207 or earlier.
Check Version:
Not applicable - check via application GUI
Verify Fix Applied:
Confirm version is 12.6.1204.208 or later in Help > About menu.
📡 Detection & Monitoring
Log Indicators:
- Application crashes with memory access violations
- Unusual file processing activity in application logs
Network Indicators:
- Unexpected outbound connections from CAD software
- Large CAD file transfers from untrusted sources
SIEM Query:
EventID=1000 OR EventID=1001 AND ProcessName contains 'Ashlar' OR 'Vellum'