Open Design Alliance Drawings SDK
The Open Design Alliance Drawings SDK contains buffer overflow and memory safety vulnerabilities (CWE-125, CWE-787, CWE-754, CWE-416) in its file parsing logic. When a user opens a specially crafted project or drawing file, these flaws can result in arbitrary code execution within the SDK process or a denial-of-service condition. The vulnerabilities are triggered during the parsing of the drawing file and do not require authentication or network access—only that the file is opened on a system running the affected SDK.
- Local access to a system running Drawings SDK
- User interaction required: the victim must open a malicious project file
- Access to or ability to place a malicious drawing/CAD file on the system
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c7a42101-b189-4bb1-a510-12b5e0277f06Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.