CVE-2025-9976

9.0 CRITICAL

📋 TL;DR

This CVE describes an OS command injection vulnerability in the Station Launcher App of the 3DEXPERIENCE platform. Attackers can execute arbitrary code on affected systems by injecting malicious commands. Users running 3DEXPERIENCE R2022x through R2025x are vulnerable.

💻 Affected Systems

Products:
  • 3DEXPERIENCE platform Station Launcher App
Versions: R2022x through R2025x
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to install malware, steal data, pivot to other systems, or deploy ransomware across the network.

🟠

Likely Case

Local privilege escalation leading to data theft, system manipulation, or persistence mechanisms being installed.

🟢

If Mitigated

Limited impact with proper network segmentation and endpoint protection blocking malicious payloads.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Command injection vulnerabilities typically have low exploitation complexity once the injection point is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.3ds.com/trust-center/security/security-advisories/cve-2025-9976

Restart Required: Yes

Instructions:

1. Review the vendor advisory for specific patched versions
2. Update 3DEXPERIENCE platform to the latest secure version
3. Restart affected services and verify functionality

🔧 Temporary Workarounds

Network Segmentation

all

Isolate 3DEXPERIENCE systems from critical networks and internet access

Application Whitelisting

all

Restrict which applications can be executed from the Station Launcher context

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Deploy endpoint detection and response (EDR) solutions to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check 3DEXPERIENCE version against affected range R2022x through R2025x

Check Version:

Check 3DEXPERIENCE platform version through administrative interface or installation logs

Verify Fix Applied:

Verify installation of patched version specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution from Station Launcher process
  • Suspicious child processes spawned from 3DEXPERIENCE components

Network Indicators:

  • Unexpected outbound connections from 3DEXPERIENCE systems
  • Command and control traffic patterns

SIEM Query:

Process creation events where parent process contains 'StationLauncher' or '3DEXPERIENCE' with suspicious command line arguments

🔗 References

📤 Share & Export