TL;DR
A critical out-of-bounds write vulnerability exists in Dassault Systèmes eDrawings Viewer, allowing remote attackers to execute arbitrary code through malicious EPRT files or web pages.
What happened
["Out-of-bounds write flaw found in Dassault Systèmes' eDrawings Viewer software", 'Affected by parsing of specially crafted EPRT files', 'Remote code execution possible if user visits a malicious page or opens a file']
Why it matters for ops
['Requires user interaction for exploitation, but poses risk to users opening suspicious attachments or visiting compromised sites', 'CVSS rating indicates high severity impact and ease of exploit']
Mitigation
- Apply vendor-provided updates immediately to patch vulnerability
- Exercise caution when opening attachments and visiting untrusted websites
Action items
- Update Dassault Systèmes eDrawings Viewer software to the latest version
- Deploy intrusion detection systems to monitor for unusual file parsing activities
Detection IOCs
- EPRT files with unusual structures or headers
- Unexpected network requests from eDrawings Viewer process