Description
A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.
Published: 2026-01-26
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A heap‑based buffer overflow occurs in the EPRT file reading routine of SOLIDWORKS eDrawings, allowing a maliciously crafted EPRT file to cause the program to execute arbitrary code. The vulnerability permits an attacker to compromise confidentiality, integrity, and availability of the affected system by running code with the privileges of the eDrawings user. The vulnerability is classified as CWE‑122, a heap overflow weakness that can be triggered when processing lawful or malicious input. The representation side of the vulnerability does not expose any network controls; it relies on the user opening the compromised file. Execution is feasible by delivering a specially constructed EPRT file to a user who opens it in the affected application. The CVSS score of 7.8 indicates high severity, but the EPSS score of <1% shows a very low likelihood of exploitation overall; the vulnerability is not listed in the CISA KEV catalog.

Affected Systems

The vulnerability affects Dassault Systèmes SOLIDWORKS eDrawings across Desktop releases 2025 through 2026. Any deployment of these releases running the eDrawings component is susceptible when processing EPRT files. Versions prior to 2025 and later than 2026 are not impacted.

Risk and Exploitability

The flaw is a heap‑based buffer overflow (CWE‑122) that can be triggered by opening a specially crafted EPRT file. Attackers must supply a file to a credentialed or non‑credentialed user; no remote network trigger is required. The CVSS score of 7.8 signals high severity, but the EPSS <1% indicates a very low overall likelihood of exploitation. The vulnerability is currently not listed in the CISA KEV catalog, suggesting no known widespread weaponization.

Generated by OpenCVE AI on April 18, 2026 at 15:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Dassault Systèmes security update that addresses the buffer overflow in SOLIDWORKS eDrawings.
  • Verify that EPRT files originate from trusted sources and do not automatically open unknown files.
  • Use endpoint protection and file integrity monitoring to detect anomalous EPRT files before opening them.
  • Upgrade to a SOLIDWORKS eDrawings release newer than 2026 if available.

Generated by OpenCVE AI on April 18, 2026 at 15:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file. A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.
Title Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Dassault
Dassault edrawings
Vendors & Products Dassault
Dassault edrawings

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 13:45:00 +0000

Type Values Removed Values Added
Description A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.
Title Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Dassault Edrawings
cve-icon MITRE

Status: PUBLISHED

Assigner: 3DS

Published:

Updated: 2026-02-26T15:04:52.136Z

Reserved: 2026-01-21T11:57:34.125Z

Link: CVE-2026-1283

cve-icon Vulnrichment

Updated: 2026-01-26T14:43:47.059Z

cve-icon NVD

Status : Deferred

Published: 2026-01-26T14:15:56.853

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1283

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:15:03Z

Weaknesses