May 9, 2024, 5 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Dassault Syst��mes eDrawings Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-3298.

arbitrary code attackers code code execution cvss dassault systèmes exploit file malicious out-of-bounds out-of-bounds write page parsing rating remote code remote code execution target viewer vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Information Technology Security Engineer

@ Plexus Worldwide | Scottsdale, Arizona, United States

Principal Email Security Researcher (Cortex XDR)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Lead Security Engineer - Cloud Security, AWS

@ JPMorgan Chase & Co. | Bengaluru, Karnataka, India