CVE-2025-7042

7.8 HIGH

📋 TL;DR

A Use After Free vulnerability in SOLIDWORKS eDrawings allows attackers to execute arbitrary code when users open malicious IPT files. This affects users of SOLIDWORKS Desktop 2025 who process IPT files through eDrawings. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • SOLIDWORKS eDrawings
Versions: SOLIDWORKS Desktop 2025
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open malicious IPT file. eDrawings must be installed and configured as default viewer for IPT files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative privileges, data theft, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to data exfiltration, malware installation, or persistence mechanisms on the affected workstation.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash only.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious file. Memory corruption vulnerabilities in file parsers are commonly exploited.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SOLIDWORKS 2025 SP1 or later updates

Vendor Advisory: https://www.3ds.com/trust-center/security/security-advisories/cve-2025-7042

Restart Required: Yes

Instructions:

1. Open SOLIDWORKS
2. Go to Help > Check for Updates
3. Install available updates
4. Restart computer

🔧 Temporary Workarounds

Disable IPT file association

windows

Prevent eDrawings from automatically opening IPT files

Control Panel > Default Programs > Associate a file type or protocol with a program > Change .ipt association to Notepad or other safe viewer

Application sandboxing

windows

Run eDrawings in restricted environment

🧯 If You Can't Patch

  • Implement application allowlisting to block unauthorized executables
  • Restrict user privileges to standard user accounts (not administrator)

🔍 How to Verify

Check if Vulnerable:

Check SOLIDWORKS version in Help > About SOLIDWORKS. If version is 2025 without SP1, system is vulnerable.

Check Version:

Not applicable - use GUI method via Help > About SOLIDWORKS

Verify Fix Applied:

Verify version shows 2025 SP1 or later after update installation.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of eDrawings.exe
  • Unusual process creation from eDrawings.exe
  • Suspicious file access patterns for IPT files

Network Indicators:

  • Outbound connections from eDrawings.exe to unusual destinations
  • DNS queries for command and control domains following IPT file opening

SIEM Query:

Process Creation where Image contains 'edrawings.exe' and CommandLine contains '.ipt'

🔗 References

📤 Share & Export