CVE-2026-1335: CWE-787 Out-of-bounds Write in Dassault Systèmes SOLIDWORKS eDrawings
CVE-2026-1335 is a high-severity out-of-bounds write vulnerability in Dassault Systèmes SOLIDWORKS eDrawings affecting versions from Release SOLIDWORKS Desktop 2025 SP0 through 2026 SP0. The flaw exists in the EPRT file reading procedure and can be exploited by opening a specially crafted EPRT file, potentially allowing arbitrary code execution. Exploitation requires local access and user interaction but no privileges or authentication. Although no known exploits are currently in the wild, the vulnerability impacts confidentiality, integrity, and availability severely. European organizations using SOLIDWORKS eDrawings for CAD viewing and collaboration, especially in manufacturing, automotive, aerospace, and engineering sectors, are at risk. Mitigation involves applying vendor patches once available, restricting EPRT file handling, and employing application whitelisting and endpoint detection. Countries with significant manufacturing and engineering industries such as Germany, France, Italy, and the UK are most likely to be affected. The vulnerability’s CVSS score of 7. 8 reflects its high severity due to ease of exploitation and potential impact. Defenders should prioritize patching and limit exposure to untrusted EPRT files to prevent exploitation.
AI Analysis
Technical Summary
CVE-2026-1335 is an out-of-bounds write vulnerability classified under CWE-787 found in the EPRT file reading component of Dassault Systèmes SOLIDWORKS eDrawings, specifically affecting Release SOLIDWORKS Desktop 2025 SP0 through 2026 SP0. This vulnerability arises when the software improperly handles the parsing of EPRT files, allowing an attacker to write data beyond the intended buffer boundaries. Such memory corruption can lead to arbitrary code execution when a user opens a maliciously crafted EPRT file. The attack vector requires local access and user interaction (opening the file), but no prior privileges or authentication are necessary, making it a significant risk for users who receive files from untrusted sources. The vulnerability impacts confidentiality, integrity, and availability by enabling execution of attacker-controlled code, potentially leading to system compromise or data exfiltration. Although no public exploits have been reported yet, the vulnerability’s presence in widely used CAD viewing software used in engineering and manufacturing environments increases its attractiveness to attackers. The CVSS v3.1 base score is 7.8, reflecting high severity with attack vector local, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. The lack of available patches at the time of reporting necessitates immediate risk mitigation through operational controls. SOLIDWORKS eDrawings is commonly used in European industries that rely on CAD data exchange, making this vulnerability particularly relevant for organizations in these sectors.
Potential Impact
The vulnerability poses a significant risk to European organizations that rely on SOLIDWORKS eDrawings for CAD file viewing and collaboration, especially in sectors such as automotive, aerospace, manufacturing, and engineering. Successful exploitation could allow attackers to execute arbitrary code on affected systems, leading to potential data theft, intellectual property compromise, disruption of engineering workflows, and broader network compromise if lateral movement is achieved. Given the critical role of CAD data in product design and manufacturing, such an attack could result in operational downtime, loss of competitive advantage, and financial damage. The requirement for user interaction means phishing or social engineering could be used to deliver malicious EPRT files, increasing the attack surface. The high confidentiality, integrity, and availability impacts underscore the need for urgent mitigation in environments where SOLIDWORKS eDrawings is integrated into business processes. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once the vulnerability is public.
Mitigation Recommendations
1. Monitor Dassault Systèmes communications closely and apply official patches or updates as soon as they become available to remediate the vulnerability. 2. Until patches are released, restrict the handling of EPRT files by disabling automatic opening or previewing within SOLIDWORKS eDrawings and associated applications. 3. Implement strict email and file transfer filtering to block or quarantine suspicious EPRT files from untrusted sources. 4. Employ application whitelisting to prevent execution of unauthorized code resulting from exploitation. 5. Use endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts. 6. Educate users about the risks of opening unsolicited or unexpected CAD files, emphasizing caution with EPRT files. 7. Isolate systems running SOLIDWORKS eDrawings from critical network segments to limit potential lateral movement. 8. Conduct regular backups of critical design data and verify recovery procedures to mitigate impact from potential attacks. 9. Review and harden system configurations and access controls to minimize exposure. 10. Collaborate with internal security teams and CAD software administrators to ensure coordinated response and monitoring.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Sweden
CVE-2026-1335: CWE-787 Out-of-bounds Write in Dassault Systèmes SOLIDWORKS eDrawings
Description
CVE-2026-1335 is a high-severity out-of-bounds write vulnerability in Dassault Systèmes SOLIDWORKS eDrawings affecting versions from Release SOLIDWORKS Desktop 2025 SP0 through 2026 SP0. The flaw exists in the EPRT file reading procedure and can be exploited by opening a specially crafted EPRT file, potentially allowing arbitrary code execution. Exploitation requires local access and user interaction but no privileges or authentication. Although no known exploits are currently in the wild, the vulnerability impacts confidentiality, integrity, and availability severely. European organizations using SOLIDWORKS eDrawings for CAD viewing and collaboration, especially in manufacturing, automotive, aerospace, and engineering sectors, are at risk. Mitigation involves applying vendor patches once available, restricting EPRT file handling, and employing application whitelisting and endpoint detection. Countries with significant manufacturing and engineering industries such as Germany, France, Italy, and the UK are most likely to be affected. The vulnerability’s CVSS score of 7. 8 reflects its high severity due to ease of exploitation and potential impact. Defenders should prioritize patching and limit exposure to untrusted EPRT files to prevent exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2026-1335 is an out-of-bounds write vulnerability classified under CWE-787 found in the EPRT file reading component of Dassault Systèmes SOLIDWORKS eDrawings, specifically affecting Release SOLIDWORKS Desktop 2025 SP0 through 2026 SP0. This vulnerability arises when the software improperly handles the parsing of EPRT files, allowing an attacker to write data beyond the intended buffer boundaries. Such memory corruption can lead to arbitrary code execution when a user opens a maliciously crafted EPRT file. The attack vector requires local access and user interaction (opening the file), but no prior privileges or authentication are necessary, making it a significant risk for users who receive files from untrusted sources. The vulnerability impacts confidentiality, integrity, and availability by enabling execution of attacker-controlled code, potentially leading to system compromise or data exfiltration. Although no public exploits have been reported yet, the vulnerability’s presence in widely used CAD viewing software used in engineering and manufacturing environments increases its attractiveness to attackers. The CVSS v3.1 base score is 7.8, reflecting high severity with attack vector local, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. The lack of available patches at the time of reporting necessitates immediate risk mitigation through operational controls. SOLIDWORKS eDrawings is commonly used in European industries that rely on CAD data exchange, making this vulnerability particularly relevant for organizations in these sectors.
Potential Impact
The vulnerability poses a significant risk to European organizations that rely on SOLIDWORKS eDrawings for CAD file viewing and collaboration, especially in sectors such as automotive, aerospace, manufacturing, and engineering. Successful exploitation could allow attackers to execute arbitrary code on affected systems, leading to potential data theft, intellectual property compromise, disruption of engineering workflows, and broader network compromise if lateral movement is achieved. Given the critical role of CAD data in product design and manufacturing, such an attack could result in operational downtime, loss of competitive advantage, and financial damage. The requirement for user interaction means phishing or social engineering could be used to deliver malicious EPRT files, increasing the attack surface. The high confidentiality, integrity, and availability impacts underscore the need for urgent mitigation in environments where SOLIDWORKS eDrawings is integrated into business processes. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once the vulnerability is public.
Mitigation Recommendations
1. Monitor Dassault Systèmes communications closely and apply official patches or updates as soon as they become available to remediate the vulnerability. 2. Until patches are released, restrict the handling of EPRT files by disabling automatic opening or previewing within SOLIDWORKS eDrawings and associated applications. 3. Implement strict email and file transfer filtering to block or quarantine suspicious EPRT files from untrusted sources. 4. Employ application whitelisting to prevent execution of unauthorized code resulting from exploitation. 5. Use endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts. 6. Educate users about the risks of opening unsolicited or unexpected CAD files, emphasizing caution with EPRT files. 7. Isolate systems running SOLIDWORKS eDrawings from critical network segments to limit potential lateral movement. 8. Conduct regular backups of critical design data and verify recovery procedures to mitigate impact from potential attacks. 9. Review and harden system configurations and access controls to minimize exposure. 10. Collaborate with internal security teams and CAD software administrators to ensure coordinated response and monitoring.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- 3DS
- Date Reserved
- 2026-01-22T08:11:00.363Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699322e0d1735ca7318966e8
Added to database: 2/16/2026, 2:00:00 PM
Last enriched: 2/16/2026, 2:13:57 PM
Last updated: 2/16/2026, 3:06:23 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2561: Privilege Escalation in JingDong JD Cloud Box AX6600
MediumCVE-2026-2560: OS Command Injection in kalcaddle kodbox
MediumCVE-2026-2558: Server-Side Request Forgery in GeekAI
MediumCVE-2026-1334: CWE-125 Out-of-bounds Read in Dassault Systèmes SOLIDWORKS eDrawings
HighCVE-2026-1333: CWE-457 Use of Uninitialized Variable in Dassault Systèmes SOLIDWORKS eDrawings
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.