CVE-2021-34897

7.8 HIGH

📋 TL;DR

CVE-2021-34897 is a buffer overflow vulnerability in Bentley View's DGN file parser that allows remote code execution. Attackers can exploit this by tricking users into opening malicious DGN files, potentially compromising affected systems. Users of Bentley View 10.15.0.75 are primarily affected.

💻 Affected Systems

Products:
  • Bentley View
Versions: 10.15.0.75
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open malicious DGN files. All installations of the affected version are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the affected system, data theft, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive files and system resources on the compromised machine.

🟢

If Mitigated

Limited impact with application crash or denial of service if exploit attempts are blocked by security controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once a malicious file is opened. The vulnerability was discovered by Zero Day Initiative (ZDI-CAN-14864).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Bentley View version 10.16.02.58 or later

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0009

Restart Required: Yes

Instructions:

1. Download the latest version from Bentley's official website. 2. Run the installer. 3. Restart the system after installation completes.

🔧 Temporary Workarounds

Block DGN file extensions

windows

Prevent execution of DGN files via group policy or application control

Using Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: Path: *.dgn, Security Level: Disallowed

User awareness training

all

Educate users not to open DGN files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to block Bentley View execution
  • Deploy network segmentation to isolate systems running vulnerable software

🔍 How to Verify

Check if Vulnerable:

Check Bentley View version: Open Bentley View > Help > About Bentley View. If version is 10.15.0.75, the system is vulnerable.

Check Version:

In Bentley View: Help > About Bentley View

Verify Fix Applied:

Verify version is 10.16.02.58 or later in Help > About Bentley View. Test opening known safe DGN files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of Bentley View with memory access violations
  • Unexpected process creation from Bentley View executable

Network Indicators:

  • Downloads of DGN files from untrusted sources
  • Outbound connections from Bentley View to suspicious IPs

SIEM Query:

EventID=1000 OR EventID=1001 Source='Bentley View' AND (FaultingModule LIKE '%dgn%' OR ExceptionCode=0xc0000005)

🔗 References

📤 Share & Export