{"api_version":"1","generated_at":"2026-04-22T23:22:17+00:00","cve":"CVE-2023-2763","urls":{"html":"https://cve.report/CVE-2023-2763","api":"https://cve.report/api/cve/CVE-2023-2763.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2763","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2763"},"summary":{"title":"CVE-2023-2763","description":"Use-After-Free, Out-of-bounds Write and Heap-based Buffer Overflow vulnerabilities exist in the DWG and DXF file reading procedure in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted DWG or DXF file.","state":"PUBLIC","assigner":"3DS.Information-Security@3ds.com","published_at":"2023-07-12 08:15:00","updated_at":"2023-07-20 01:56:00"},"problem_types":["CWE-787","CWE-416"],"metrics":[],"references":[{"url":"https://www.3ds.com/vulnerability/advisories","name":"https://www.3ds.com/vulnerability/advisories","refsource":"MISC","tags":[],"title":"Dassault Systèmes Security Advisories | Dassault Systèmes","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2763","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2763","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"2763","vulnerable":"1","versionEndIncluding":"2023","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"3ds","cpe5":"3dexperience_solidworks","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-2763","ASSIGNER":"3DS.Information-Security@3ds.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Use-After-Free, Out-of-bounds Write and Heap-based Buffer Overflow vulnerabilities exist in the DWG and DXF file reading procedure in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted DWG or DXF file."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-416 Use After Free","cweId":"CWE-416"}]},{"description":[{"lang":"eng","value":"CWE-787 Out-of-bounds Write","cweId":"CWE-787"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Dassault Systèmes","product":{"product_data":[{"product_name":"SOLIDWORKS Desktop","version":{"version_data":[{"version_affected":"<=","version_name":"Release SOLIDWORKS 2021 Golden","version_value":"Release SOLIDWORKS 2021 SP5.1"},{"version_affected":"<=","version_name":"Release SOLIDWORKS 2022 Golden","version_value":"Release SOLIDWORKS 2022 SP5"},{"version_affected":"<=","version_name":"Release SOLIDWORKS 2023 Golden","version_value":"Release SOLIDWORKS 2023 SP2"}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.3ds.com/vulnerability/advisories","refsource":"MISC","name":"https://www.3ds.com/vulnerability/advisories"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Mat Powell from Trend Micro's Zero Day Initiative"}],"impact":{"cvss":[{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"HIGH","baseScore":7.8,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}},"nvd":{"publishedDate":"2023-07-12 08:15:00","lastModifiedDate":"2023-07-20 01:56:00","problem_types":["CWE-787","CWE-416"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:3ds:3dexperience_solidworks:*:*:*:*:*:*:*:*","versionStartIncluding":"2021","versionEndIncluding":"2023","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}