CVE-2021-34878

7.8 HIGH

📋 TL;DR

CVE-2021-34878 is a buffer overflow vulnerability in Bentley View's JT file parser that allows remote code execution. Attackers can exploit it by tricking users into opening malicious JT files, potentially compromising their systems. This affects users of Bentley View 10.15.0.75 who process JT files from untrusted sources.

💻 Affected Systems

Products:
  • Bentley View
Versions: 10.15.0.75
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where Bentley View is installed and users open JT files. The vulnerability is in the JT file parser component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the victim's machine, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware installation on individual workstations, disrupting engineering workflows and potentially exposing sensitive project data.

🟢

If Mitigated

Limited impact with only application crashes or denial of service if exploit attempts are blocked by security controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) but the vulnerability is well-documented and weaponization is likely given the RCE potential.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.16.0.61 or later

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005

Restart Required: Yes

Instructions:

1. Download Bentley View version 10.16.0.61 or later from Bentley's official website. 2. Run the installer and follow the upgrade prompts. 3. Restart the application and any related services. 4. Verify the update by checking the version in Help > About.

🔧 Temporary Workarounds

Disable JT file association

windows

Remove Bentley View as the default handler for JT files to prevent automatic opening

Control Panel > Default Programs > Set Associations > Find .jt > Change program

Block JT files at perimeter

all

Configure email/web gateways to block JT file attachments and downloads

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized code execution
  • Use network segmentation to isolate engineering workstations from critical systems

🔍 How to Verify

Check if Vulnerable:

Check Bentley View version in Help > About menu. If version is exactly 10.15.0.75, the system is vulnerable.

Check Version:

In Bentley View: Help > About, or check registry: HKEY_LOCAL_MACHINE\SOFTWARE\Bentley\Bentley View\Version

Verify Fix Applied:

Verify version is 10.16.0.61 or later in Help > About menu. Test opening known-safe JT files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in Bentley View with memory access violations
  • Unexpected child processes spawned from Bentley View
  • Failed JT file parsing attempts

Network Indicators:

  • JT file downloads from untrusted sources
  • Outbound connections from Bentley View to suspicious IPs

SIEM Query:

source="*bentley*" AND (event_id=1000 OR process_name="BentleyView.exe") AND (exception_code=0xc0000005 OR command_line="*.jt")

🔗 References

📤 Share & Export