CVE-2026-1283

7.8 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in SOLIDWORKS eDrawings allows attackers to execute arbitrary code when users open malicious EPRT files. This affects SOLIDWORKS Desktop 2025 through 2026 installations with eDrawings. Users who open untrusted EPRT files are at risk of complete system compromise.

💻 Affected Systems

Products:
  • SOLIDWORKS eDrawings
  • SOLIDWORKS Desktop
Versions: SOLIDWORKS Desktop 2025 through SOLIDWORKS Desktop 2026
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with eDrawings component are vulnerable by default when opening EPRT files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data theft, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to installation of persistent malware, credential theft, and system compromise.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only application crash.

🌐 Internet-Facing: LOW - Requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious files via email or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious EPRT file. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SOLIDWORKS Service Pack for 2025 and 2026 releases

Vendor Advisory: https://www.3ds.com/trust-center/security/security-advisories/cve-2026-1283

Restart Required: Yes

Instructions:

1. Open SOLIDWORKS. 2. Go to Help > Check for Updates. 3. Install latest Service Pack. 4. Restart computer. 5. Verify eDrawings is updated.

🔧 Temporary Workarounds

Disable EPRT file association

windows

Remove file association for .EPRT files to prevent automatic opening in eDrawings

Windows: Control Panel > Default Programs > Associate a file type > Select .EPRT > Change program > Choose different application

Application control policy

windows

Use AppLocker or similar to restrict eDrawings execution to trusted locations

🧯 If You Can't Patch

  • Implement application sandboxing for eDrawings using Windows Sandbox or similar
  • Block all .EPRT files at email gateway and web proxy

🔍 How to Verify

Check if Vulnerable:

Check SOLIDWORKS version: Open SOLIDWORKS > Help > About SOLIDWORKS. If version is 2025 or 2026, check if latest Service Pack is installed.

Check Version:

Windows: reg query "HKLM\SOFTWARE\Dassault Systemes\SolidWorks" /v "Release Version"

Verify Fix Applied:

Verify eDrawings version is updated by opening eDrawings standalone and checking version in About dialog.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of eDrawings.exe
  • Unusual process creation from eDrawings.exe
  • Memory access violations in application logs

Network Indicators:

  • Downloads of .EPRT files from untrusted sources
  • Outbound connections from eDrawings process

SIEM Query:

process_name:eDrawings.exe AND (event_id:1000 OR event_id:1001) OR file_extension:EPRT

🔗 References

📤 Share & Export