CVE-2026-1334: CWE-125 Out-of-bounds Read in Dassault Systèmes SOLIDWORKS eDrawings
An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.
AI Analysis
Technical Summary
CVE-2026-1334 is an out-of-bounds read vulnerability classified under CWE-125 that affects the EPRT file parsing functionality in Dassault Systèmes SOLIDWORKS eDrawings versions from SOLIDWORKS Desktop 2025 SP0 through 2026 SP0. The vulnerability arises when the software improperly handles boundary checks during the reading of EPRT files, which are used to represent 3D part data. An attacker can craft a malicious EPRT file that triggers an out-of-bounds read, leading to memory corruption. This memory corruption can be leveraged to execute arbitrary code within the context of the user opening the file. The CVSS 3.1 vector indicates that exploitation requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but user interaction (UI:R) is necessary. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning successful exploitation could lead to full system compromise, data theft, or disruption of operations. No public exploits or patches are currently available, but the vulnerability is publicly disclosed and should be considered a significant risk for affected users. The vulnerability's presence in widely used CAD software poses a threat to industries relying on 3D design and manufacturing workflows.
Potential Impact
The potential impact of CVE-2026-1334 is substantial for organizations using SOLIDWORKS eDrawings in their design and manufacturing processes. Successful exploitation could allow attackers to execute arbitrary code, leading to unauthorized access to sensitive intellectual property, modification or destruction of design files, and disruption of engineering workflows. This could result in financial losses, reputational damage, and operational downtime. Since SOLIDWORKS is widely used in automotive, aerospace, industrial machinery, and consumer product design, the vulnerability could affect critical supply chains and innovation pipelines. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where users frequently exchange design files. The lack of patches at the time of disclosure increases exposure, and attackers may develop exploits targeting this vulnerability, potentially leading to targeted attacks or malware delivery through compromised design files.
Mitigation Recommendations
To mitigate CVE-2026-1334, organizations should implement the following specific measures: 1) Restrict the opening of EPRT files to trusted sources only and educate users about the risks of opening files from unknown or unverified origins. 2) Employ application whitelisting and sandboxing techniques to isolate SOLIDWORKS eDrawings processes, limiting the impact of potential exploitation. 3) Monitor and control file transfer channels, such as email and collaboration platforms, to detect and block suspicious EPRT files. 4) Use endpoint detection and response (EDR) tools to identify anomalous behavior related to SOLIDWORKS processes. 5) Coordinate with Dassault Systèmes for timely patch deployment once available and test updates in controlled environments before widespread rollout. 6) Consider network segmentation to limit access to critical design systems and reduce lateral movement opportunities. 7) Maintain regular backups of design files and system states to enable recovery in case of compromise. These targeted actions go beyond generic advice by focusing on file handling policies, process isolation, and proactive monitoring tailored to the nature of this vulnerability.
Affected Countries
United States, Germany, Japan, South Korea, France, United Kingdom, China, Canada, Italy, Sweden
CVE-2026-1334: CWE-125 Out-of-bounds Read in Dassault Systèmes SOLIDWORKS eDrawings
Description
An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1334 is an out-of-bounds read vulnerability classified under CWE-125 that affects the EPRT file parsing functionality in Dassault Systèmes SOLIDWORKS eDrawings versions from SOLIDWORKS Desktop 2025 SP0 through 2026 SP0. The vulnerability arises when the software improperly handles boundary checks during the reading of EPRT files, which are used to represent 3D part data. An attacker can craft a malicious EPRT file that triggers an out-of-bounds read, leading to memory corruption. This memory corruption can be leveraged to execute arbitrary code within the context of the user opening the file. The CVSS 3.1 vector indicates that exploitation requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but user interaction (UI:R) is necessary. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning successful exploitation could lead to full system compromise, data theft, or disruption of operations. No public exploits or patches are currently available, but the vulnerability is publicly disclosed and should be considered a significant risk for affected users. The vulnerability's presence in widely used CAD software poses a threat to industries relying on 3D design and manufacturing workflows.
Potential Impact
The potential impact of CVE-2026-1334 is substantial for organizations using SOLIDWORKS eDrawings in their design and manufacturing processes. Successful exploitation could allow attackers to execute arbitrary code, leading to unauthorized access to sensitive intellectual property, modification or destruction of design files, and disruption of engineering workflows. This could result in financial losses, reputational damage, and operational downtime. Since SOLIDWORKS is widely used in automotive, aerospace, industrial machinery, and consumer product design, the vulnerability could affect critical supply chains and innovation pipelines. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where users frequently exchange design files. The lack of patches at the time of disclosure increases exposure, and attackers may develop exploits targeting this vulnerability, potentially leading to targeted attacks or malware delivery through compromised design files.
Mitigation Recommendations
To mitigate CVE-2026-1334, organizations should implement the following specific measures: 1) Restrict the opening of EPRT files to trusted sources only and educate users about the risks of opening files from unknown or unverified origins. 2) Employ application whitelisting and sandboxing techniques to isolate SOLIDWORKS eDrawings processes, limiting the impact of potential exploitation. 3) Monitor and control file transfer channels, such as email and collaboration platforms, to detect and block suspicious EPRT files. 4) Use endpoint detection and response (EDR) tools to identify anomalous behavior related to SOLIDWORKS processes. 5) Coordinate with Dassault Systèmes for timely patch deployment once available and test updates in controlled environments before widespread rollout. 6) Consider network segmentation to limit access to critical design systems and reduce lateral movement opportunities. 7) Maintain regular backups of design files and system states to enable recovery in case of compromise. These targeted actions go beyond generic advice by focusing on file handling policies, process isolation, and proactive monitoring tailored to the nature of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- 3DS
- Date Reserved
- 2026-01-22T08:10:56.326Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699322e0d1735ca7318966e5
Added to database: 2/16/2026, 2:00:00 PM
Last enriched: 3/3/2026, 8:30:40 PM
Last updated: 4/1/2026, 12:19:35 AM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.