CVE-2026-1333 Overview
A Use of Uninitialized Variable vulnerability (CWE-457) has been identified in SOLIDWORKS eDrawings affecting the EPRT file reading procedure. This vulnerability allows an attacker to execute arbitrary code when a user opens a specially crafted EPRT file. The flaw exists in SOLIDWORKS Desktop versions 2025 through 2026 and requires user interaction to exploit.
Critical Impact
Successful exploitation enables arbitrary code execution with the privileges of the user running SOLIDWORKS eDrawings, potentially leading to complete system compromise through malicious EPRT files.
Affected Products
- SOLIDWORKS Desktop 2025
- SOLIDWORKS Desktop 2026
- SOLIDWORKS eDrawings (versions bundled with Desktop 2025-2026)
Discovery Timeline
- 2026-02-16 - CVE-2026-1333 published to NVD
- 2026-02-18 - Last updated in NVD database
Technical Details for CVE-2026-1333
Vulnerability Analysis
This vulnerability stems from the use of an uninitialized variable within the EPRT file parsing functionality of SOLIDWORKS eDrawings. When the application processes a maliciously crafted EPRT file, the uninitialized variable may contain unpredictable memory contents that the attacker can leverage to hijack program execution flow.
The local attack vector requires user interaction—specifically, opening a malicious EPRT file. However, once a victim opens the crafted file, the attacker gains full control with the ability to compromise confidentiality, integrity, and availability of the affected system. This makes it particularly dangerous in scenarios where users receive EPRT files from external sources, such as vendors, partners, or through email attachments.
Root Cause
The root cause is classified under CWE-457 (Use of Uninitialized Variable). During EPRT file parsing, certain code paths in the file reading procedure fail to properly initialize a variable before use. When the uninitialized variable is subsequently referenced, it may contain attacker-controlled data from the heap or stack, enabling memory corruption and ultimately arbitrary code execution.
Attack Vector
The attack requires local access and user interaction. An attacker must craft a malicious EPRT file and convince the victim to open it using SOLIDWORKS eDrawings. Attack delivery methods may include:
- Email attachments disguised as legitimate engineering files
- Shared network drives or cloud storage
- Compromised file sharing platforms
- Social engineering tactics targeting engineering and design teams
When the victim opens the malicious EPRT file, the uninitialized variable vulnerability is triggered during the file parsing process, allowing the attacker to execute arbitrary code in the context of the user's session.
Detection Methods for CVE-2026-1333
Indicators of Compromise
- Unexpected crashes or abnormal behavior when opening EPRT files in SOLIDWORKS eDrawings
- Process injection or suspicious child processes spawned from SOLIDWORKS eDrawings executables
- Unusual network connections initiated by SOLIDWORKS eDrawings processes
- Modified or newly created files in sensitive directories following EPRT file access
Detection Strategies
- Monitor for suspicious EPRT files with anomalous file structures or sizes
- Implement endpoint detection rules for unusual process behavior associated with SOLIDWORKS eDrawings
- Deploy file integrity monitoring on systems running SOLIDWORKS Desktop
- Enable enhanced logging for SOLIDWORKS application events
Monitoring Recommendations
- Configure SentinelOne agents to monitor SOLIDWORKS eDrawings process behavior for exploitation attempts
- Establish baseline behavior for SOLIDWORKS processes and alert on deviations
- Monitor for process hollowing or code injection techniques targeting SOLIDWORKS executables
- Implement email gateway filtering for suspicious EPRT file attachments
How to Mitigate CVE-2026-1333
Immediate Actions Required
- Apply the security patch from Dassault Systèmes as soon as available
- Restrict opening EPRT files from untrusted or unknown sources
- Implement user awareness training about the risks of opening unsolicited CAD files
- Consider temporary restrictions on EPRT file handling until patched
Patch Information
Dassault Systèmes has published a security advisory for this vulnerability. Affected organizations should consult the 3DS Security Advisory for CVE-2026-1333 for official patch information and remediation guidance. Apply all available security updates for SOLIDWORKS Desktop 2025 and 2026 as they become available.
Workarounds
- Block or quarantine EPRT files at email gateways and web proxies until patches are applied
- Implement application whitelisting to prevent unauthorized code execution from SOLIDWORKS processes
- Use virtual machines or sandboxed environments when opening EPRT files from external sources
- Temporarily disable EPRT file associations if the functionality is not business-critical
# Configuration example - Block EPRT files at email gateway (example rule)
# Add .eprt extension to blocked file types list
# Consult your email gateway documentation for specific implementation
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

