CVE-2025-65084 Overview
An Out-of-Bounds Write vulnerability (CWE-787) has been identified in Ashlar-Vellum CAD products including Cobalt, Xenon, Argon, Lithium, and Cobalt Share. This memory corruption flaw affects versions 12.6.1204.207 and prior, allowing attackers to potentially disclose sensitive information or execute arbitrary code on affected systems.
The vulnerability requires local access and user interaction to exploit, typically through specially crafted project files that trigger the out-of-bounds write condition when processed by the vulnerable application.
Critical Impact
Successful exploitation could allow attackers to execute arbitrary code with the privileges of the current user, potentially leading to complete system compromise in design and engineering environments.
Affected Products
- Ashlar-Vellum Cobalt version 12.6.1204.207 and prior
- Ashlar-Vellum Xenon version 12.6.1204.207 and prior
- Ashlar-Vellum Argon version 12.6.1204.207 and prior
- Ashlar-Vellum Lithium version 12.6.1204.207 and prior
- Ashlar-Vellum Cobalt Share version 12.6.1204.207 and prior
Discovery Timeline
- 2025-11-25 - CVE-2025-65084 published to NVD
- 2025-11-28 - Last updated in NVD database
Technical Details for CVE-2025-65084
Vulnerability Analysis
This Out-of-Bounds Write vulnerability exists in the file parsing components of Ashlar-Vellum's CAD software suite. When processing malformed or specially crafted input files, the application fails to properly validate buffer boundaries before writing data, allowing memory to be corrupted beyond allocated buffer limits.
The local attack vector means an attacker must convince a user to open a malicious file, which is a common attack scenario in design and engineering environments where project files are frequently shared between teams and external partners. CISA has issued an ICS advisory (ICSA-25-329-01) highlighting the risks to industrial control system environments where these CAD tools may be deployed.
Root Cause
The vulnerability stems from insufficient bounds checking during file parsing operations. When the application processes certain file structures, it calculates buffer sizes or offsets incorrectly, leading to write operations that exceed allocated memory boundaries. This type of memory corruption can overwrite adjacent memory regions including function pointers, return addresses, or other critical data structures.
Attack Vector
The attack requires local access to the system and relies on user interaction to trigger the vulnerability. A typical exploitation scenario involves:
- An attacker crafts a malicious CAD project file containing specially designed data structures
- The victim opens the malicious file using one of the affected Ashlar-Vellum applications
- During file parsing, the out-of-bounds write condition is triggered
- The attacker achieves either information disclosure or arbitrary code execution depending on the specific memory corruption achieved
The vulnerability does not require any privileges to exploit beyond those of a normal user who can run the affected applications.
Detection Methods for CVE-2025-65084
Indicators of Compromise
- Unexpected crashes in Ashlar-Vellum applications (Cobalt, Xenon, Argon, Lithium, or Cobalt Share) during file operations
- Presence of unusual or unfamiliar CAD project files from untrusted sources
- Memory access violations or application errors logged in system event logs
- Unusual process behavior or child processes spawned from Ashlar-Vellum applications
Detection Strategies
- Monitor for application crashes and memory access violations in Ashlar-Vellum CAD applications
- Implement file integrity monitoring for incoming CAD project files from external sources
- Deploy endpoint detection and response (EDR) solutions to identify suspicious memory manipulation patterns
- Enable application crash reporting and analyze dump files for exploitation attempts
Monitoring Recommendations
- Configure logging for all Ashlar-Vellum application events and errors
- Monitor network file shares and email attachments for suspicious CAD file formats
- Implement SentinelOne Singularity platform for real-time behavioral analysis of CAD application activity
- Alert on unusual process execution chains originating from Ashlar-Vellum applications
How to Mitigate CVE-2025-65084
Immediate Actions Required
- Update all Ashlar-Vellum products (Cobalt, Xenon, Argon, Lithium, and Cobalt Share) to the latest available version beyond 12.6.1204.207
- Restrict opening CAD files from untrusted or unknown sources until patching is complete
- Implement network segmentation to isolate systems running vulnerable CAD applications
- Train users to verify the source of CAD files before opening them
Patch Information
Organizations should consult the CISA ICS Advisory ICSA-25-329-01 for official remediation guidance. Contact Ashlar-Vellum directly for the latest security patches addressing this vulnerability. Ensure all instances of the affected products across your environment are identified and scheduled for updates.
Workarounds
- Implement strict file validation and scanning procedures for all incoming CAD project files
- Restrict execution of Ashlar-Vellum applications to dedicated workstations with limited network access
- Apply application whitelisting to prevent unauthorized code execution if the vulnerability is exploited
- Consider using virtual machine isolation for opening CAD files from external sources until patches are applied
- Deploy network-level controls to limit data exfiltration if systems are compromised
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

