CVE-2026-1284

7.8 HIGH

📋 TL;DR

An out-of-bounds write vulnerability in SOLIDWORKS eDrawings allows attackers to execute arbitrary code when users open malicious EPRT files. This affects users of SOLIDWORKS Desktop 2025 through 2026. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • SOLIDWORKS eDrawings
Versions: SOLIDWORKS Desktop 2025 through SOLIDWORKS Desktop 2026
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the EPRT file reading procedure. Only affects systems where eDrawings is installed and users open EPRT files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms on the affected workstation.

🟢

If Mitigated

Limited impact with proper application sandboxing, user privilege restrictions, and network segmentation preventing lateral movement.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SOLIDWORKS Service Pack releases after vulnerability disclosure

Vendor Advisory: https://www.3ds.com/trust-center/security/security-advisories/cve-2026-1284

Restart Required: Yes

Instructions:

1. Open SOLIDWORKS
2. Go to Help > Check for Updates
3. Install latest service pack
4. Restart computer

🔧 Temporary Workarounds

Block EPRT file extensions

windows

Prevent opening of EPRT files via group policy or application control

Run with reduced privileges

windows

Configure eDrawings to run with standard user privileges instead of administrative rights

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized execution
  • Use network segmentation to isolate engineering workstations

🔍 How to Verify

Check if Vulnerable:

Check SOLIDWORKS version via Help > About SOLIDWORKS. If version is 2025 or 2026 without latest service pack, system is vulnerable.

Check Version:

In SOLIDWORKS: Help > About SOLIDWORKS

Verify Fix Applied:

Verify installed service pack version matches or exceeds the patched version mentioned in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected eDrawings process crashes
  • EPRT file access from untrusted sources
  • Unusual process spawning from eDrawings.exe

Network Indicators:

  • Outbound connections from engineering workstations to suspicious IPs after EPRT file opening

SIEM Query:

Process Creation where Image contains 'eDrawings.exe' AND ParentImage contains 'explorer.exe' AND CommandLine contains '.eprt'

🔗 References

📤 Share & Export