CVE-2026-1335

7.8 HIGH

📋 TL;DR

An Out-Of-Bounds Write vulnerability in SOLIDWORKS eDrawings allows an attacker to execute arbitrary code by tricking a user into opening a malicious EPRT file. This affects users of SOLIDWORKS Desktop 2025 through 2026. Exploitation could lead to full system compromise.

💻 Affected Systems

Products:
  • SOLIDWORKS eDrawings
Versions: SOLIDWORKS Desktop 2025 through SOLIDWORKS Desktop 2026
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the EPRT file reading procedure; all default installations within the version range are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with arbitrary code execution, potentially leading to data theft, ransomware deployment, or lateral movement within a network.

🟠

Likely Case

Local privilege escalation or malware installation on the victim's machine, disrupting operations or stealing sensitive design files.

🟢

If Mitigated

Limited impact if systems are isolated, patched, or users avoid untrusted files, though residual risk of data loss or downtime may persist.

🌐 Internet-Facing: LOW, as exploitation requires user interaction to open a malicious file, not direct network exposure.
🏢 Internal Only: MEDIUM, due to the potential for phishing or social engineering attacks within an organization to deliver malicious files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a crafted EPRT file, but no authentication is needed once the file is accessed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions (e.g., SOLIDWORKS Desktop 2026 SP1 or later).

Vendor Advisory: https://www.3ds.com/trust-center/security/security-advisories/cve-2026-1335

Restart Required: Yes

Instructions:

1. Visit the vendor advisory URL for details. 2. Update SOLIDWORKS eDrawings to the latest patched version via the SOLIDWORKS update manager or download from the official website. 3. Restart the application or system as prompted.

🔧 Temporary Workarounds

Block EPRT file extensions

windows

Prevent opening of .EPRT files by blocking the file extension at the email gateway or endpoint.

Not applicable; configure via email security tools or group policy.

User awareness training

all

Educate users to avoid opening EPRT files from untrusted sources.

Not applicable; implement training programs.

🧯 If You Can't Patch

  • Restrict user permissions to limit the impact of arbitrary code execution.
  • Isolate affected systems from critical networks and monitor for suspicious file activity.

🔍 How to Verify

Check if Vulnerable:

Check the SOLIDWORKS version in the application's 'Help' > 'About' menu; if it falls within 2025-2026 range, it is vulnerable.

Check Version:

In SOLIDWORKS eDrawings, go to 'Help' > 'About' to view the version number.

Verify Fix Applied:

After updating, confirm the version is above the patched release specified in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes of SOLIDWORKS eDrawings when opening files
  • Process creation events from eDrawings with suspicious command lines

Network Indicators:

  • Unusual outbound connections from systems running eDrawings after file opens

SIEM Query:

Example: 'process_name:eDrawings.exe AND event_type:process_creation AND command_line:*EPRT*'

🔗 References

📤 Share & Export