CVE-2024-10204

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious X_B or SAT files in eDrawings. It affects users of SOLIDWORKS 2024 through 2025 who open untrusted CAD files. The heap buffer overflow and uninitialized variable issues could lead to complete system compromise.

💻 Affected Systems

Products:
  • SOLIDWORKS eDrawings
Versions: SOLIDWORKS 2024 through SOLIDWORKS 2025
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects eDrawings component when opening X_B or SAT files. Requires user interaction to open malicious file.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data theft, ransomware deployment, and lateral movement across networks.

🟠

Likely Case

Local privilege escalation leading to data exfiltration, persistence establishment, or credential harvesting from the compromised system.

🟢

If Mitigated

Limited impact due to file type restrictions, user awareness, and endpoint protection blocking malicious files.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user to open malicious file. No authentication needed beyond file access. Heap manipulation requires some sophistication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Dassault Systèmes advisory for specific patch versions

Vendor Advisory: https://www.3ds.com/vulnerability/advisories

Restart Required: Yes

Instructions:

1. Visit Dassault Systèmes security advisory page
2. Download latest SOLIDWORKS update
3. Install update following vendor instructions
4. Restart system to complete installation

🔧 Temporary Workarounds

File Type Restriction

all

Block X_B and SAT file extensions at email gateways and web proxies

Application Control

windows

Restrict eDrawings execution to trusted users only

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized eDrawings execution
  • Educate users to never open CAD files from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check SOLIDWORKS version in Help > About. If version is 2024 or 2025, assume vulnerable until patched.

Check Version:

In SOLIDWORKS: Help > About SOLIDWORKS

Verify Fix Applied:

Verify installed version is later than vulnerable range and check vendor advisory for specific fixed versions.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected eDrawings crashes
  • Process creation from eDrawings with unusual parameters
  • File access to X_B or SAT files from untrusted locations

Network Indicators:

  • Downloads of CAD files from untrusted sources
  • Outbound connections from eDrawings process

SIEM Query:

Process:edrawings.exe AND (FileExtension:.x_b OR FileExtension:.sat) AND SourceIP:External

🔗 References

📤 Share & Export