Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1283: CWE-122 Heap-based Buffer Overflow in Dassault Systèmes SOLIDWORKS eDrawings

0
High
VulnerabilityCVE-2026-1283cvecve-2026-1283cwe-122
Published: Mon Jan 26 2026 (01/26/2026, 13:25:04 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: SOLIDWORKS eDrawings

Description

CVE-2026-1283 is a high-severity heap-based buffer overflow vulnerability in Dassault Systèmes SOLIDWORKS eDrawings affecting releases 2025 SP0 and 2026 SP0. The flaw exists in the EPRT file reading procedure and can be triggered by opening a specially crafted EPRT file. Successful exploitation allows an unauthenticated attacker to execute arbitrary code with user interaction required. The vulnerability impacts confidentiality, integrity, and availability due to potential full system compromise. No known exploits are currently in the wild. European organizations using SOLIDWORKS eDrawings, especially in engineering and manufacturing sectors, are at risk. Mitigation involves applying vendor patches once available, restricting EPRT file handling, and employing application whitelisting and endpoint protections. Countries with strong manufacturing and CAD usage such as Germany, France, Italy, and the UK are most likely affected. The CVSS score is 7. 8, indicating high severity.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:35:45 UTC

Technical Analysis

CVE-2026-1283 is a heap-based buffer overflow vulnerability identified in Dassault Systèmes SOLIDWORKS eDrawings, specifically within the EPRT file reading functionality. This vulnerability affects SOLIDWORKS Desktop releases 2025 SP0 and 2026 SP0. The flaw arises when the software processes specially crafted EPRT files, which are used to represent 3D part data. Due to improper bounds checking during heap memory operations, an attacker can overflow the buffer, corrupting adjacent memory. This memory corruption can be leveraged to execute arbitrary code in the context of the user running the application. Exploitation requires the victim to open a malicious EPRT file, which implies user interaction is necessary. No privileges are required to trigger the vulnerability, making it accessible to unauthenticated attackers who can deliver the file via email, file sharing, or other means. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution could lead to data theft, system manipulation, or denial of service. Although no public exploits are known at this time, the high CVSS score of 7.8 reflects the significant risk posed by this vulnerability. The CWE-122 classification confirms the root cause as a heap-based buffer overflow, a common and dangerous memory corruption issue. Dassault Systèmes has not yet published patches, but organizations should prepare to deploy updates promptly once available.

Potential Impact

For European organizations, especially those in engineering, manufacturing, and design sectors that rely heavily on SOLIDWORKS eDrawings for CAD visualization and collaboration, this vulnerability poses a serious risk. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to intellectual property theft, sabotage of design files, or disruption of production workflows. The compromise of design data could have cascading effects on supply chains and product development cycles. Additionally, since the vulnerability requires user interaction but no authentication, phishing or social engineering campaigns could be used to deliver malicious EPRT files. The impact extends beyond individual workstations to networked environments if attackers leverage lateral movement post-compromise. Given the strategic importance of manufacturing and engineering in Europe, the threat could affect critical infrastructure and economic competitiveness. The absence of known exploits currently provides a window for proactive defense, but the high severity demands urgent attention.

Mitigation Recommendations

1. Monitor Dassault Systèmes communications closely and apply official patches immediately upon release to remediate the vulnerability. 2. Until patches are available, implement strict controls on the receipt and opening of EPRT files, including blocking or quarantining EPRT attachments in email gateways and endpoint security solutions. 3. Educate users on the risks of opening unsolicited or unexpected EPRT files, emphasizing cautious handling of CAD-related file formats. 4. Employ application whitelisting to restrict execution of unauthorized or unknown files and scripts. 5. Use endpoint detection and response (EDR) tools to monitor for anomalous behavior indicative of exploitation attempts. 6. Network segmentation can limit lateral movement if a workstation is compromised. 7. Regularly back up critical design data and verify backup integrity to enable recovery in case of compromise. 8. Conduct vulnerability scanning and penetration testing focused on CAD environments to identify and remediate related weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
3DS
Date Reserved
2026-01-21T11:57:34.125Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697771404623b1157c944d7b

Added to database: 1/26/2026, 1:50:56 PM

Last enriched: 2/4/2026, 8:35:45 AM

Last updated: 2/5/2026, 7:12:37 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats