CVE-2026-1334: CWE-125 Out-of-bounds Read in Dassault Systèmes SOLIDWORKS eDrawings
CVE-2026-1334 is a high-severity out-of-bounds read vulnerability in Dassault Systèmes SOLIDWORKS eDrawings affecting versions from SOLIDWORKS Desktop 2025 SP0 through 2026 SP0. The flaw exists in the EPRT file reading procedure and can be exploited by opening a specially crafted EPRT file, potentially allowing an attacker to execute arbitrary code. Exploitation requires local access and user interaction to open the malicious file, but no prior privileges are needed. The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 7. 8. No known exploits are currently reported in the wild. European organizations using these SOLIDWORKS versions, especially in engineering, manufacturing, and design sectors, face risks of targeted attacks. Mitigation involves applying vendor patches once available, restricting file sources, and employing application whitelisting and sandboxing. Countries with strong manufacturing and engineering industries such as Germany, France, Italy, and the UK are most likely to be affected.
AI Analysis
Technical Summary
CVE-2026-1334 is an out-of-bounds read vulnerability classified under CWE-125 that affects the EPRT file parsing functionality in Dassault Systèmes SOLIDWORKS eDrawings software, specifically in releases SOLIDWORKS Desktop 2025 SP0 and 2026 SP0. The vulnerability arises when the software processes specially crafted EPRT files, leading to an out-of-bounds memory read condition. This memory corruption can be leveraged by an attacker to execute arbitrary code within the context of the user running the application. The attack vector requires the victim to open a malicious EPRT file, which implies user interaction is necessary. No privileges are required to exploit this vulnerability, but the attacker must have a means to deliver the crafted file to the target system. The CVSS v3.1 base score is 7.8, reflecting high severity due to the potential for full compromise of confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant risk given the widespread use of SOLIDWORKS eDrawings in engineering and design workflows. The lack of available patches at the time of reporting necessitates proactive mitigation strategies. The vulnerability's impact is critical in environments where intellectual property and design data confidentiality are paramount. Attackers could use this flaw to execute code, potentially leading to data theft, sabotage, or lateral movement within corporate networks.
Potential Impact
For European organizations, especially those in the manufacturing, automotive, aerospace, and industrial design sectors, this vulnerability could lead to severe consequences. Exploitation could result in unauthorized access to sensitive design files and intellectual property, undermining competitive advantage and potentially causing financial losses. The ability to execute arbitrary code could allow attackers to deploy malware, ransomware, or establish persistent footholds within corporate networks. Given the reliance on SOLIDWORKS eDrawings for product development, disruption or compromise could delay projects and damage reputations. The confidentiality breach risk is particularly critical in Europe due to stringent data protection regulations such as GDPR, which could lead to regulatory penalties if sensitive data is exposed. Additionally, the integrity and availability of design data are crucial for operational continuity, and any compromise could halt production lines or lead to defective products. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where file sharing is common. The absence of known exploits currently provides a window for mitigation but also underscores the need for vigilance.
Mitigation Recommendations
1. Monitor Dassault Systèmes communications closely and apply official patches immediately upon release to remediate the vulnerability. 2. Until patches are available, restrict the opening of EPRT files from untrusted or unknown sources by implementing strict file handling policies. 3. Employ application whitelisting to limit execution of unauthorized files and scripts within engineering workstations. 4. Use sandboxing or isolated environments for opening EPRT files, minimizing potential impact from malicious files. 5. Educate users on the risks of opening unsolicited or unexpected files, emphasizing caution with EPRT files received via email or file sharing platforms. 6. Implement network segmentation to isolate critical design and engineering systems from general user networks, reducing lateral movement opportunities. 7. Utilize endpoint detection and response (EDR) solutions to monitor for suspicious behaviors indicative of exploitation attempts. 8. Conduct regular backups of design data and verify their integrity to ensure recovery capability in case of compromise. 9. Review and tighten access controls on systems running SOLIDWORKS eDrawings to limit exposure. 10. Consider disabling or limiting the use of eDrawings viewers where feasible until patches are applied.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Sweden, Belgium
CVE-2026-1334: CWE-125 Out-of-bounds Read in Dassault Systèmes SOLIDWORKS eDrawings
Description
CVE-2026-1334 is a high-severity out-of-bounds read vulnerability in Dassault Systèmes SOLIDWORKS eDrawings affecting versions from SOLIDWORKS Desktop 2025 SP0 through 2026 SP0. The flaw exists in the EPRT file reading procedure and can be exploited by opening a specially crafted EPRT file, potentially allowing an attacker to execute arbitrary code. Exploitation requires local access and user interaction to open the malicious file, but no prior privileges are needed. The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 7. 8. No known exploits are currently reported in the wild. European organizations using these SOLIDWORKS versions, especially in engineering, manufacturing, and design sectors, face risks of targeted attacks. Mitigation involves applying vendor patches once available, restricting file sources, and employing application whitelisting and sandboxing. Countries with strong manufacturing and engineering industries such as Germany, France, Italy, and the UK are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2026-1334 is an out-of-bounds read vulnerability classified under CWE-125 that affects the EPRT file parsing functionality in Dassault Systèmes SOLIDWORKS eDrawings software, specifically in releases SOLIDWORKS Desktop 2025 SP0 and 2026 SP0. The vulnerability arises when the software processes specially crafted EPRT files, leading to an out-of-bounds memory read condition. This memory corruption can be leveraged by an attacker to execute arbitrary code within the context of the user running the application. The attack vector requires the victim to open a malicious EPRT file, which implies user interaction is necessary. No privileges are required to exploit this vulnerability, but the attacker must have a means to deliver the crafted file to the target system. The CVSS v3.1 base score is 7.8, reflecting high severity due to the potential for full compromise of confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant risk given the widespread use of SOLIDWORKS eDrawings in engineering and design workflows. The lack of available patches at the time of reporting necessitates proactive mitigation strategies. The vulnerability's impact is critical in environments where intellectual property and design data confidentiality are paramount. Attackers could use this flaw to execute code, potentially leading to data theft, sabotage, or lateral movement within corporate networks.
Potential Impact
For European organizations, especially those in the manufacturing, automotive, aerospace, and industrial design sectors, this vulnerability could lead to severe consequences. Exploitation could result in unauthorized access to sensitive design files and intellectual property, undermining competitive advantage and potentially causing financial losses. The ability to execute arbitrary code could allow attackers to deploy malware, ransomware, or establish persistent footholds within corporate networks. Given the reliance on SOLIDWORKS eDrawings for product development, disruption or compromise could delay projects and damage reputations. The confidentiality breach risk is particularly critical in Europe due to stringent data protection regulations such as GDPR, which could lead to regulatory penalties if sensitive data is exposed. Additionally, the integrity and availability of design data are crucial for operational continuity, and any compromise could halt production lines or lead to defective products. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where file sharing is common. The absence of known exploits currently provides a window for mitigation but also underscores the need for vigilance.
Mitigation Recommendations
1. Monitor Dassault Systèmes communications closely and apply official patches immediately upon release to remediate the vulnerability. 2. Until patches are available, restrict the opening of EPRT files from untrusted or unknown sources by implementing strict file handling policies. 3. Employ application whitelisting to limit execution of unauthorized files and scripts within engineering workstations. 4. Use sandboxing or isolated environments for opening EPRT files, minimizing potential impact from malicious files. 5. Educate users on the risks of opening unsolicited or unexpected files, emphasizing caution with EPRT files received via email or file sharing platforms. 6. Implement network segmentation to isolate critical design and engineering systems from general user networks, reducing lateral movement opportunities. 7. Utilize endpoint detection and response (EDR) solutions to monitor for suspicious behaviors indicative of exploitation attempts. 8. Conduct regular backups of design data and verify their integrity to ensure recovery capability in case of compromise. 9. Review and tighten access controls on systems running SOLIDWORKS eDrawings to limit exposure. 10. Consider disabling or limiting the use of eDrawings viewers where feasible until patches are applied.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- 3DS
- Date Reserved
- 2026-01-22T08:10:56.326Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699322e0d1735ca7318966e5
Added to database: 2/16/2026, 2:00:00 PM
Last enriched: 2/16/2026, 2:14:16 PM
Last updated: 2/16/2026, 3:06:28 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2561: Privilege Escalation in JingDong JD Cloud Box AX6600
MediumCVE-2026-2560: OS Command Injection in kalcaddle kodbox
MediumCVE-2026-2558: Server-Side Request Forgery in GeekAI
MediumCVE-2026-1335: CWE-787 Out-of-bounds Write in Dassault Systèmes SOLIDWORKS eDrawings
HighCVE-2026-1333: CWE-457 Use of Uninitialized Variable in Dassault Systèmes SOLIDWORKS eDrawings
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.