CVE-2021-46570
📋 TL;DR
This vulnerability in Bentley View allows remote attackers to disclose sensitive information by exploiting improper memory initialization when parsing JT files. Attackers can combine this with other vulnerabilities to execute arbitrary code. Users of affected Bentley View versions who open malicious JT files or visit malicious web pages are at risk.
💻 Affected Systems
- Bentley View
📦 What is this software?
View by Bentley
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, and lateral movement within the network.
Likely Case
Information disclosure and potential system compromise if combined with other vulnerabilities.
If Mitigated
Limited impact with proper file validation and user awareness preventing malicious file execution.
🎯 Exploit Status
Requires user interaction (opening malicious file) and typically needs chaining with other vulnerabilities for full RCE.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to Bentley View version 10.16.1 or later
Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
Restart Required: Yes
Instructions:
1. Download latest Bentley View installer from official Bentley website
2. Run installer and follow prompts
3. Restart system after installation completes
4. Verify version is 10.16.1 or higher
🔧 Temporary Workarounds
Disable JT file association
windowsRemove Bentley View as default handler for JT files to prevent automatic opening
Control Panel > Default Programs > Associate a file type or protocol with a program > Select .jt > Change program > Choose another application
Implement application whitelisting
windowsRestrict execution of Bentley View to trusted locations only
🧯 If You Can't Patch
- Implement strict file validation policies to block untrusted JT files
- Use network segmentation to isolate Bentley View systems from critical assets
🔍 How to Verify
Check if Vulnerable:
Check Bentley View version in Help > About; if version is 10.16.0.80 or earlier, system is vulnerable
Check Version:
Open Bentley View > Help > About
Verify Fix Applied:
Verify version is 10.16.1 or higher in Help > About dialog
📡 Detection & Monitoring
Log Indicators:
- Unexpected process crashes of Bentley View
- Multiple failed JT file parsing attempts
- Unusual file access patterns from Bentley View process
Network Indicators:
- Outbound connections from Bentley View to unknown IPs
- JT file downloads from untrusted sources
SIEM Query:
process_name="Bentley View" AND (event_id=1000 OR file_extension=".jt")