TL;DR

A critical out-of-bounds write vulnerability exists in Dassault Systèmes eDrawings Viewer, allowing remote attackers to execute arbitrary code through malicious EPRT files or web pages.

What happened

["Out-of-bounds write flaw found in Dassault Systèmes' eDrawings Viewer software", 'Affected by parsing of specially crafted EPRT files', 'Remote code execution possible if user visits a malicious page or opens a file']

Why it matters for ops

['Requires user interaction for exploitation, but poses risk to users opening suspicious attachments or visiting compromised sites', 'CVSS rating indicates high severity impact and ease of exploit']

Mitigation

  • Apply vendor-provided updates immediately to patch vulnerability
  • Exercise caution when opening attachments and visiting untrusted websites

Action items

  • Update Dassault Systèmes eDrawings Viewer software to the latest version
  • Deploy intrusion detection systems to monitor for unusual file parsing activities

Detection IOCs

  • EPRT files with unusual structures or headers
  • Unexpected network requests from eDrawings Viewer process

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-114/