CVE-2026-1284: CWE-787 Out-of-bounds Write in Dassault Systèmes SOLIDWORKS eDrawings
An Out-Of-Bounds Write vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.
AI Analysis
Technical Summary
CVE-2026-1284 is an out-of-bounds write vulnerability classified under CWE-787, discovered in the EPRT file reading procedure of Dassault Systèmes SOLIDWORKS eDrawings versions 2025 SP0 and 2026 SP0. This vulnerability arises when the software improperly handles specially crafted EPRT files, leading to memory corruption through writing outside the intended buffer boundaries. Such memory corruption can be leveraged by an attacker to execute arbitrary code within the context of the user opening the file. The attack vector requires local access (AV:L) and user interaction (UI:R), but no privileges (PR:N) are necessary, making it a significant risk if malicious files are received via email, shared drives, or other file transfer methods. The vulnerability impacts confidentiality, integrity, and availability (all rated high), as arbitrary code execution could lead to data theft, system compromise, or denial of service. Although no public exploits are known at this time, the vulnerability's presence in widely used CAD software used extensively in engineering and manufacturing sectors makes it a critical concern. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through operational controls and monitoring.
Potential Impact
For European organizations, especially those in the manufacturing, automotive, aerospace, and engineering sectors that rely heavily on SOLIDWORKS eDrawings for design visualization and collaboration, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to intellectual property theft, disruption of design workflows, and compromise of sensitive engineering data. This could result in financial losses, reputational damage, and operational downtime. Given the collaborative nature of design files, a compromised system could serve as a pivot point for broader network infiltration. The requirement for user interaction means phishing or social engineering could be used to deliver malicious EPRT files, increasing the attack surface. The high confidentiality and integrity impact is particularly concerning for organizations handling proprietary designs or regulated products. Additionally, disruption to availability could delay critical production timelines, affecting supply chains and market competitiveness.
Mitigation Recommendations
1. Monitor Dassault Systèmes communications closely and apply official patches immediately once released for SOLIDWORKS eDrawings 2025 SP0 and 2026 SP0. 2. Until patches are available, restrict the opening of EPRT files from untrusted or unknown sources through policy enforcement and user training. 3. Implement application whitelisting to limit execution of unauthorized files and sandbox SOLIDWORKS eDrawings where feasible to contain potential exploits. 4. Employ advanced endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts. 5. Educate users on phishing and social engineering risks associated with opening unsolicited design files. 6. Use network segmentation to isolate systems running SOLIDWORKS eDrawings from critical infrastructure and sensitive data repositories. 7. Regularly back up design files and system configurations to enable recovery in case of compromise. 8. Conduct vulnerability scanning and penetration testing focused on CAD environments to identify and remediate related risks proactively.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Sweden
CVE-2026-1284: CWE-787 Out-of-bounds Write in Dassault Systèmes SOLIDWORKS eDrawings
Description
An Out-Of-Bounds Write vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.
AI-Powered Analysis
Technical Analysis
CVE-2026-1284 is an out-of-bounds write vulnerability classified under CWE-787, discovered in the EPRT file reading procedure of Dassault Systèmes SOLIDWORKS eDrawings versions 2025 SP0 and 2026 SP0. This vulnerability arises when the software improperly handles specially crafted EPRT files, leading to memory corruption through writing outside the intended buffer boundaries. Such memory corruption can be leveraged by an attacker to execute arbitrary code within the context of the user opening the file. The attack vector requires local access (AV:L) and user interaction (UI:R), but no privileges (PR:N) are necessary, making it a significant risk if malicious files are received via email, shared drives, or other file transfer methods. The vulnerability impacts confidentiality, integrity, and availability (all rated high), as arbitrary code execution could lead to data theft, system compromise, or denial of service. Although no public exploits are known at this time, the vulnerability's presence in widely used CAD software used extensively in engineering and manufacturing sectors makes it a critical concern. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through operational controls and monitoring.
Potential Impact
For European organizations, especially those in the manufacturing, automotive, aerospace, and engineering sectors that rely heavily on SOLIDWORKS eDrawings for design visualization and collaboration, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to intellectual property theft, disruption of design workflows, and compromise of sensitive engineering data. This could result in financial losses, reputational damage, and operational downtime. Given the collaborative nature of design files, a compromised system could serve as a pivot point for broader network infiltration. The requirement for user interaction means phishing or social engineering could be used to deliver malicious EPRT files, increasing the attack surface. The high confidentiality and integrity impact is particularly concerning for organizations handling proprietary designs or regulated products. Additionally, disruption to availability could delay critical production timelines, affecting supply chains and market competitiveness.
Mitigation Recommendations
1. Monitor Dassault Systèmes communications closely and apply official patches immediately once released for SOLIDWORKS eDrawings 2025 SP0 and 2026 SP0. 2. Until patches are available, restrict the opening of EPRT files from untrusted or unknown sources through policy enforcement and user training. 3. Implement application whitelisting to limit execution of unauthorized files and sandbox SOLIDWORKS eDrawings where feasible to contain potential exploits. 4. Employ advanced endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts. 5. Educate users on phishing and social engineering risks associated with opening unsolicited design files. 6. Use network segmentation to isolate systems running SOLIDWORKS eDrawings from critical infrastructure and sensitive data repositories. 7. Regularly back up design files and system configurations to enable recovery in case of compromise. 8. Conduct vulnerability scanning and penetration testing focused on CAD environments to identify and remediate related risks proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- 3DS
- Date Reserved
- 2026-01-21T11:57:40.910Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697771404623b1157c944d7e
Added to database: 1/26/2026, 1:50:56 PM
Last enriched: 1/26/2026, 2:05:15 PM
Last updated: 1/26/2026, 6:23:03 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14756: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in TP-Link Systems Inc. Archer MR600 v5.0
HighCVE-2026-24439: CWE-116 Improper Encoding or Escaping of Output in Shenzhen Tenda Technology Co., Ltd. W30E V2
LowCVE-2026-24435: CWE-942 Permissive Cross-domain Security Policy with Untrusted Domains in Shenzhen Tenda Technology Co., Ltd. W30E V2
HighCVE-2026-24432: CWE-352 Cross-Site Request Forgery (CSRF) in Shenzhen Tenda Technology Co., Ltd. W30E V2
MediumCVE-2026-0925: Improper Validation of Specified Quantity in Input in Tanium Discover
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.