CVE-2025-6972
Description
Use After Free vulnerability exists in the CATPRODUCT file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted CATPRODUCT file.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free in SOLIDWORKS eDrawings' CATPRODUCT file reader allows remote code execution when a user opens a specially crafted file.
Vulnerability
Analysis
CVE-2025-6972 describes a use-after-free vulnerability in the CATPRODUCT file reading procedure of SOLIDWORKS eDrawings, specifically in SOLIDWORKS Desktop 2025 [1]. This class of memory corruption bug occurs when the program continues to reference memory after it has been freed, potentially leading to attacker-controlled data being executed as code.
Exploitation
An attacker can exploit this vulnerability by crafting a malicious CATPRODUCT file and enticing a user to open it in the affected version of SOLIDWORKS eDrawings. Because the vulnerability resides in the file parsing routine, no special network access or authentication is required beyond the ability to deliver the file to the target user.
Impact
Successful exploitation could allow an attacker to execute arbitrary code in the context of the user running eDrawings [1]. This can lead to full system compromise, depending on the user's privileges.
Mitigation
Dassault Systèmes has acknowledged the vulnerability and recommends users apply security updates as per their advisory [1]. No public workarounds are detailed, so applying the latest patch or upgrading to a fixed version is the primary mitigation.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: 2025
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.