CVE-2021-43390

7.8 HIGH

📋 TL;DR

CVE-2021-43390 is an out-of-bounds write vulnerability in Open Design Alliance Drawings SDK that allows remote code execution when processing malicious DGN files. Attackers can exploit this by tricking users into opening specially crafted DGN files, potentially taking control of the affected system. This affects any application using vulnerable versions of the ODA Drawings SDK to handle DGN files.

💻 Affected Systems

Products:
  • Open Design Alliance Drawings SDK
  • Applications using ODA Drawings SDK for DGN file processing
Versions: All versions before 2022.11
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Any application that uses the vulnerable ODA SDK to parse DGN files is affected, regardless of operating system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker executing arbitrary code in the context of the application, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Application crash or arbitrary code execution when a user opens a malicious DGN file, potentially leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact with proper network segmentation, application sandboxing, and user education preventing malicious file execution.

🌐 Internet-Facing: MEDIUM - Risk exists if applications process user-uploaded DGN files, but exploitation requires file upload and processing.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing with malicious DGN attachments or shared network files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction to open a malicious file, but the vulnerability itself is unauthenticated. Multiple ZDI advisories suggest active exploitation is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2022.11 or later

Vendor Advisory: https://www.opendesign.com/security-advisories

Restart Required: Yes

Instructions:

1. Identify applications using ODA Drawings SDK
2. Update to ODA Drawings SDK version 2022.11 or later
3. Update any dependent applications
4. Restart affected services and applications

🔧 Temporary Workarounds

Block DGN file processing

all

Prevent applications from processing DGN files through file type blocking or application configuration

Application sandboxing

all

Run applications that process DGN files in restricted environments or containers

🧯 If You Can't Patch

  • Implement strict file upload validation and scanning for DGN files
  • Educate users about the risks of opening DGN files from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check if applications use ODA Drawings SDK version earlier than 2022.11 for DGN file processing

Check Version:

Check application documentation or contact vendor for ODA SDK version information

Verify Fix Applied:

Verify ODA Drawings SDK version is 2022.11 or later and test DGN file processing functionality

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing DGN files
  • Unusual process creation from DGN file handlers
  • Memory access violations in application logs

Network Indicators:

  • Unexpected outbound connections after DGN file processing
  • File downloads of DGN files from untrusted sources

SIEM Query:

Process creation events from applications known to handle DGN files, especially with suspicious parent processes or command-line arguments

🔗 References

📤 Share & Export