{"api_version":"1","generated_at":"2026-04-22T23:22:16+00:00","cve":"CVE-2023-2762","urls":{"html":"https://cve.report/CVE-2023-2762","api":"https://cve.report/api/cve/CVE-2023-2762.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2762","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2762"},"summary":{"title":"CVE-2023-2762","description":"A Use-After-Free vulnerability in SLDPRT file reading procedure exists in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted SLDPRT file.","state":"PUBLIC","assigner":"3DS.Information-Security@3ds.com","published_at":"2023-07-12 08:15:00","updated_at":"2023-07-20 01:49:00"},"problem_types":["CWE-416"],"metrics":[],"references":[{"url":"https://www.3ds.com/vulnerability/advisories","name":"https://www.3ds.com/vulnerability/advisories","refsource":"MISC","tags":[],"title":"Dassault Systèmes Security Advisories | Dassault Systèmes","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2762","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2762","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"2762","vulnerable":"1","versionEndIncluding":"2023","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"3ds","cpe5":"3dexperience_solidworks","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-2762","ASSIGNER":"3DS.Information-Security@3ds.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A Use-After-Free vulnerability in SLDPRT file reading procedure exists in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted SLDPRT file."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-416 Use After Free","cweId":"CWE-416"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Dassault Systèmes","product":{"product_data":[{"product_name":"SOLIDWORKS Desktop","version":{"version_data":[{"version_affected":"<=","version_name":"Release SOLIDWORKS 2021 Golden","version_value":"Release SOLIDWORKS 2021 SP5.1"},{"version_affected":"<=","version_name":"Release SOLIDWORKS 2022 Golden","version_value":"Release SOLIDWORKS 2022 SP5"},{"version_affected":"<=","version_name":"Release SOLIDWORKS 2023 Golden","version_value":"Release SOLIDWORKS 2023 SP2"}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.3ds.com/vulnerability/advisories","refsource":"MISC","name":"https://www.3ds.com/vulnerability/advisories"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Mat Powell from Trend Micro's Zero Day Initiative"}],"impact":{"cvss":[{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"HIGH","baseScore":7.8,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}},"nvd":{"publishedDate":"2023-07-12 08:15:00","lastModifiedDate":"2023-07-20 01:49:00","problem_types":["CWE-416"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:3ds:3dexperience_solidworks:*:*:*:*:*:*:*:*","versionStartIncluding":"2021","versionEndIncluding":"2023","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}