First published: Mon Mar 11 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Dassault Syst��mes eDrawings. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-1847.
Affected Software | Affected Version | How to fix |
---|---|---|
SOLIDWORKS eDrawings |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-22723 has been assigned a critical severity rating due to its potential for remote code execution.
To fix ZDI-CAN-22723, ensure that you update to the latest version of Dassault Systèmes eDrawings, which includes the necessary security patches.
Users of Dassault Systèmes eDrawings who visit malicious webpages or open malicious files are vulnerable to the exploitation of ZDI-CAN-22723.
ZDI-CAN-22723 involves remote code execution attacks that require user interaction to be successfully exploited.
No, ZDI-CAN-22723 cannot be exploited without user action, as the targeted user must either visit a malicious page or open a malicious file.