CVE-2021-34905

7.8 HIGH

📋 TL;DR

CVE-2021-34905 is a heap-based buffer overflow vulnerability in Bentley View's DGN file parser that allows remote code execution. Attackers can exploit this by tricking users into opening malicious DGN files or visiting malicious web pages. Users of affected Bentley View versions are at risk.

💻 Affected Systems

Products:
  • Bentley View
Versions: 10.15.0.75 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default installation of affected Bentley View versions when processing DGN files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attacker executes arbitrary code in the context of the current user, potentially installing malware, stealing credentials, or establishing persistence on the system.

🟢

If Mitigated

With proper controls like application whitelisting and least privilege, impact is limited to the user's context with no administrative privileges or network access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (opening malicious file) but the vulnerability itself is straightforward to exploit once the malicious file is opened.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Bentley View 10.16.0.80 and later

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0009

Restart Required: Yes

Instructions:

1. Download and install Bentley View version 10.16.0.80 or later from Bentley's official website. 2. Close all instances of Bentley View before installation. 3. Run the installer with administrative privileges. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Disable DGN file association

windows

Remove Bentley View as the default handler for .dgn files to prevent automatic exploitation when files are opened.

Control Panel > Default Programs > Associate a file type or protocol with a program > Select .dgn > Change program > Choose another application

Application control policy

all

Implement application whitelisting to prevent execution of unauthorized Bentley View versions.

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems running vulnerable Bentley View versions from critical assets.
  • Apply the principle of least privilege to user accounts that must use Bentley View to limit potential damage from exploitation.

🔍 How to Verify

Check if Vulnerable:

Check Bentley View version by opening the application and navigating to Help > About Bentley View. If version is 10.15.0.75 or earlier, the system is vulnerable.

Check Version:

In Bentley View: Help > About Bentley View

Verify Fix Applied:

After patching, verify the version shows 10.16.0.80 or later in Help > About Bentley View. Test with known safe DGN files to ensure functionality is maintained.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Bentley View executable
  • Multiple failed attempts to open corrupted DGN files
  • Unexpected network connections originating from Bentley View process

Network Indicators:

  • Outbound connections from Bentley View to unknown external IPs
  • Unusual DNS queries for command and control domains from systems running Bentley View

SIEM Query:

Process Creation where Image contains 'bentley' AND (CommandLine contains '.dgn' OR ParentImage contains 'explorer.exe')

🔗 References

📤 Share & Export