Impact
An out‑of‑bounds write flaw in the EPRT file reader of SOLIDWORKS eDrawings enables a malicious user to execute arbitrary code when a specially crafted file is opened. The vulnerability is a classic memory corruption issue (CWE‑787) that can compromise confidentiality, integrity, and availability of the system running eDrawings.
Affected Systems
Dassault Systèmes SOLIDWORKS eDrawings releases 2025 and 2026, including all service packs from SP1.0 up to SP5.0 for 2025 and SP1.1 for 2026, are affected.
Risk and Exploitability
The CVSS score of 7.8 signals high severity, while the EPSS score of less than 1% indicates a very low current probability of exploitation. The flaw is not listed in the CISA KEV catalog. The attack vector likely requires the attacker to supply a crafted EPRT file to a user, which is inferred from the description, thus it is a local file‑based exploit. The privilege level required for successful exploitation is not explicitly stated in the description, which we infer may be the privileges under which the application runs.
OpenCVE Enrichment