### [CVE-2024-10204](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10204) ![](https://img.shields.io/static/v1?label=Product&message=eDrawings&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Release%20SOLIDWORKS%202024%20SP0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Release%20SOLIDWORKS%202025%20SP0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=solidworks_2024_sp0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=solidworks_2025_sp0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%20Heap-based%20Buffer%20Overflow&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-457%3A%20Use%20of%20Uninitialized%20Variable&color=brightgreen) ### Description Heap-based Buffer Overflow and Uninitialized Variable vulnerabilities exist in the X_B and SAT file reading procedure in eDrawings from Release SOLIDWORKS 2024 through Release SOLIDWORKS 2025. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted X_B or SAT file. ### POC #### Reference - https://www.3ds.com/vulnerability/advisories #### Github No PoCs found on GitHub currently.