CVE-2021-34945

7.8 HIGH

📋 TL;DR

CVE-2021-34945 is a heap-based buffer overflow vulnerability in Bentley View's JT file parser that allows remote code execution. Attackers can exploit this by tricking users into opening malicious JT files or visiting malicious web pages. Users of affected Bentley View versions are vulnerable.

💻 Affected Systems

Products:
  • Bentley View
Versions: 10.15.0.75 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the JT file parser component. All installations with default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the user running Bentley View, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Attacker executes arbitrary code in the context of the current user, potentially installing malware, stealing sensitive data, or using the system as a foothold for further attacks.

🟢

If Mitigated

If proper controls are in place, impact is limited to the user's privileges and sandboxed environment, but still represents significant risk.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (opening malicious file). The vulnerability is well-documented and weaponization is likely given the RCE nature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.16.0.61 or later

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005

Restart Required: Yes

Instructions:

1. Download latest Bentley View version from official Bentley website. 2. Install the update. 3. Restart the application and system if prompted.

🔧 Temporary Workarounds

Disable JT file association

windows

Remove JT file type association with Bentley View to prevent automatic opening

Control Panel > Default Programs > Associate a file type or protocol with a program > Select .jt > Change program > Choose another application

Block JT files at perimeter

all

Configure email gateways and web filters to block JT file attachments

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use least privilege accounts for Bentley View users to limit potential damage

🔍 How to Verify

Check if Vulnerable:

Check Bentley View version in Help > About. If version is 10.15.0.75 or earlier, system is vulnerable.

Check Version:

In Bentley View: Help > About

Verify Fix Applied:

Verify version is 10.16.0.61 or later in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of Bentley View
  • Unusual file access patterns for JT files
  • Suspicious child processes spawned from Bentley View

Network Indicators:

  • Outbound connections from Bentley View to unknown IPs
  • JT file downloads from untrusted sources

SIEM Query:

Process:Name='Bentley View' AND (EventID=1000 OR EventID=1001) OR FileExtension='.jt' AND SourceIP NOT IN (trusted_networks)

🔗 References

📤 Share & Export