CVE-2025-6973

7.8 HIGH

📋 TL;DR

A Use After Free vulnerability in SOLIDWORKS eDrawings allows attackers to execute arbitrary code when users open malicious JT files. This affects SOLIDWORKS Desktop 2025 users who process JT files. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • SOLIDWORKS eDrawings
Versions: SOLIDWORKS Desktop 2025
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open malicious JT file. eDrawings is typically installed with SOLIDWORKS Desktop.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/administrator privileges leading to full system compromise, data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms on the affected workstation.

🟢

If Mitigated

Limited impact with application crash or denial of service if exploit fails or security controls block execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious file. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SOLIDWORKS 2025 SP1 or later updates

Vendor Advisory: https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6973

Restart Required: Yes

Instructions:

1. Open SOLIDWORKS. 2. Go to Help > Check for Updates. 3. Install all available updates. 4. Restart computer. 5. Verify version is updated.

🔧 Temporary Workarounds

Block JT file extensions

windows

Prevent opening of JT files via group policy or application control

Disable eDrawings file association

windows

Remove JT file association with eDrawings application

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized executables
  • Restrict user permissions to prevent privilege escalation

🔍 How to Verify

Check if Vulnerable:

Check SOLIDWORKS version in Help > About SOLIDWORKS. If version is 2025 without SP1, system is vulnerable.

Check Version:

Not applicable - check via GUI in Help > About SOLIDWORKS

Verify Fix Applied:

Verify version shows 2025 SP1 or later in Help > About SOLIDWORKS.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in eDrawings
  • Unusual process creation from eDrawings.exe
  • Failed file opens of JT files

Network Indicators:

  • Outbound connections from eDrawings process to unknown IPs
  • Unusual network traffic following JT file open

SIEM Query:

Process Creation where Image contains 'edrawings' AND CommandLine contains '.jt'

🔗 References

📤 Share & Export