CVE-2025-9449

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in SOLIDWORKS eDrawings' PAR file reading procedure allows attackers to execute arbitrary code when a user opens a malicious PAR file. This affects SOLIDWORKS Desktop 2025 users who open untrusted PAR files. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • SOLIDWORKS eDrawings
  • SOLIDWORKS Desktop
Versions: SOLIDWORKS Desktop 2025
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects PAR file processing in eDrawings component; other file formats may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data theft, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, credential theft, and persistence mechanisms on the affected workstation.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash rather than code execution.

🌐 Internet-Facing: LOW - Attack requires user interaction to open malicious file; not directly exploitable via network services.
🏢 Internal Only: MEDIUM - Risk exists when users open PAR files from untrusted sources (email, downloads, shared drives) within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious PAR file; memory corruption exploitation requires bypassing modern mitigations like ASLR/DEP.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SOLIDWORKS 2025 Service Pack 1 or later updates

Vendor Advisory: https://www.3ds.com/trust-center/security/security-advisories/cve-2025-9449

Restart Required: Yes

Instructions:

1. Open SOLIDWORKS
2. Go to Help > Check for Updates
3. Install all available updates
4. Restart computer as prompted

🔧 Temporary Workarounds

Block PAR file extensions

windows

Prevent PAR files from being opened by eDrawings via file association changes

assoc .par=
ftype PARFile=

Application control policy

windows

Use Windows AppLocker or similar to restrict eDrawings from executing untrusted code

🧯 If You Can't Patch

  • Implement strict file type filtering on email gateways and web proxies to block PAR files
  • Educate users to never open PAR files from untrusted sources and verify file integrity before opening

🔍 How to Verify

Check if Vulnerable:

Check SOLIDWORKS version in Help > About SOLIDWORKS; if version is 2025 without latest service packs, likely vulnerable

Check Version:

In SOLIDWORKS: Help > About SOLIDWORKS

Verify Fix Applied:

Verify installed version is 2025 SP1 or later and check vendor advisory for specific build numbers

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in eDrawings with PAR file access
  • Unexpected child processes spawned from eDrawings.exe
  • Memory access violations in application logs

Network Indicators:

  • Outbound connections from eDrawings.exe to unexpected destinations
  • DNS requests for suspicious domains following PAR file opening

SIEM Query:

Process Creation where (ParentImage contains 'eDrawings.exe' OR Image contains 'eDrawings.exe') AND CommandLine contains '.par'

🔗 References

📤 Share & Export