TL;DR

A critical remote code execution flaw exists in the EPRT file parsing mechanism of Dassault Systèmes eDrawings Viewer.

What happened

['Dassault Systèmes eDrawings Viewer suffers from a memory corruption vulnerability that can lead to remote code execution']

Why it matters for ops

['Requires user interaction, such as opening a malicious file', 'Can be exploited remotely by sending specially crafted EPRT files', 'Has been assigned CVSS rating of 7.8 indicating high severity']

Mitigation

  • Update to the latest version of Dassault Systèmes eDrawings Viewer
  • Block EPRT files at network perimeter

Action items

  • Patch affected systems immediately
  • Review network traffic for signs of exploitation
  • Inform users about the potential risks and safe handling practices

Detection IOCs

  • CVE-2026-1334
  • Malicious EPRT file attachments or links

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-113/