Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1283: CWE-122 Heap-based Buffer Overflow in Dassault Systèmes SOLIDWORKS eDrawings

0
High
VulnerabilityCVE-2026-1283cvecve-2026-1283cwe-122
Published: Mon Jan 26 2026 (01/26/2026, 13:25:04 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: SOLIDWORKS eDrawings

Description

A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:47:36 UTC

Technical Analysis

CVE-2026-1283 is a heap-based buffer overflow vulnerability classified under CWE-122, affecting the EPRT file parsing functionality in Dassault Systèmes SOLIDWORKS eDrawings versions from SOLIDWORKS Desktop 2025 SP0 through 2026 SP0. The vulnerability arises when the application processes specially crafted EPRT files, leading to an overflow in heap memory. This overflow can corrupt adjacent memory structures, enabling an attacker to execute arbitrary code within the context of the user running the application. The attack vector requires the victim to open a malicious EPRT file, which means user interaction is necessary. No privileges are required to exploit this vulnerability, increasing its risk profile. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required but requiring user interaction. Although no public exploits have been reported yet, the vulnerability's nature and impact make it a critical concern for organizations relying on SOLIDWORKS eDrawings for CAD visualization and collaboration. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies to reduce exposure.

Potential Impact

The potential impact of CVE-2026-1283 is significant for organizations using affected versions of SOLIDWORKS eDrawings. Exploitation can lead to arbitrary code execution, allowing attackers to compromise system confidentiality by accessing sensitive design data, integrity by modifying or corrupting CAD files, and availability by crashing or destabilizing the application or host system. This can result in intellectual property theft, sabotage of engineering projects, and disruption of critical design workflows. Given the widespread use of SOLIDWORKS in manufacturing, aerospace, automotive, and industrial design sectors, a successful attack could have cascading effects on supply chains and product development cycles. The requirement for user interaction limits mass exploitation but targeted spear-phishing or social engineering attacks could effectively deliver malicious EPRT files. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure. Organizations face risks of reputational damage, financial loss, and operational downtime if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2026-1283, organizations should implement a multi-layered approach: 1) Monitor Dassault Systèmes advisories closely and apply official patches or updates as soon as they become available to address the vulnerability directly. 2) Restrict the acceptance and opening of EPRT files from untrusted or unknown sources, employing strict file validation and sandboxing techniques to isolate the eDrawings application. 3) Educate users about the risks of opening unsolicited or unexpected CAD files, emphasizing caution with email attachments and downloads. 4) Employ application whitelisting to limit execution of unauthorized code and use endpoint detection and response (EDR) tools to monitor for suspicious behaviors related to eDrawings processes. 5) Network segmentation can reduce the impact of a compromised system by limiting lateral movement. 6) Consider disabling or restricting features that automatically open or preview EPRT files within email clients or file explorers. 7) Maintain regular backups of critical design data to enable recovery in case of compromise. These targeted actions go beyond generic advice and focus on reducing the attack surface and exposure specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
3DS
Date Reserved
2026-01-21T11:57:34.125Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697771404623b1157c944d7b

Added to database: 1/26/2026, 1:50:56 PM

Last enriched: 2/27/2026, 7:47:36 AM

Last updated: 3/24/2026, 1:49:09 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses