CVE-2023-2762

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in SOLIDWORKS Desktop allows attackers to execute arbitrary code when users open malicious SLDPRT files. This affects SOLIDWORKS 2021 through 2023 releases. Users who open untrusted SLDPRT files are at risk of complete system compromise.

💻 Affected Systems

Products:
  • SOLIDWORKS Desktop
Versions: SOLIDWORKS 2021 through SOLIDWORKS 2023
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable when opening SLDPRT files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected machine, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to installation of malware, data exfiltration, or persistence mechanisms on the compromised system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash rather than code execution.

🌐 Internet-Facing: LOW - This vulnerability requires user interaction to open malicious files and is not directly exploitable over network protocols.
🏢 Internal Only: HIGH - Internal users opening malicious SLDPRT files (via email, shared drives, or downloads) can lead to significant compromise within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious file. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SOLIDWORKS Service Packs for 2021-2023 releases

Vendor Advisory: https://www.3ds.com/vulnerability/advisories

Restart Required: Yes

Instructions:

1. Check SOLIDWORKS version. 2. Download and install latest Service Pack from SOLIDWORKS Customer Portal. 3. Restart system. 4. Verify patch installation.

🔧 Temporary Workarounds

Restrict SLDPRT file handling

windows

Block or restrict opening of SLDPRT files from untrusted sources

Application sandboxing

windows

Run SOLIDWORKS in restricted environment or virtual machine

🧯 If You Can't Patch

  • Implement strict file handling policies to block SLDPRT files from untrusted sources
  • Run SOLIDWORKS with minimal user privileges and in isolated environments

🔍 How to Verify

Check if Vulnerable:

Check SOLIDWORKS version in Help > About SOLIDWORKS. If version is between 2021 and 2023, system is vulnerable.

Check Version:

In SOLIDWORKS: Help > About SOLIDWORKS

Verify Fix Applied:

Verify installed Service Pack version in Help > About SOLIDWORKS matches latest available version from vendor.

📡 Detection & Monitoring

Log Indicators:

  • SOLIDWORKS crash logs with memory access violations
  • Unexpected process creation from SOLIDWORKS

Network Indicators:

  • Outbound connections from SOLIDWORKS process to suspicious IPs

SIEM Query:

Process creation where parent_process contains 'sldworks.exe' AND process_name NOT IN (expected_child_processes)

🔗 References

📤 Share & Export