CVE-2021-46584

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious J2K image files in Bentley MicroStation CONNECT. Attackers can exploit a buffer overflow in the J2K parsing functionality to gain code execution in the context of the current process. Users of affected Bentley MicroStation versions are at risk.

💻 Affected Systems

Products:
  • Bentley MicroStation CONNECT
Versions: 10.16.0.80 and earlier versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with J2K image support enabled are vulnerable. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the workstation, potentially leading to lateral movement, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or malware installation on the affected workstation, potentially disrupting engineering workflows and compromising sensitive design data.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash but no code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability is well-documented with public advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.16.1.0 and later

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0006

Restart Required: Yes

Instructions:

1. Download the latest MicroStation CONNECT update from Bentley's official website or through the Bentley CONNECTION Client. 2. Run the installer with administrative privileges. 3. Restart the application and any related services.

🔧 Temporary Workarounds

Disable J2K file association

all

Remove J2K file type association with MicroStation to prevent automatic opening

Windows: Use 'Default Programs' in Control Panel to change J2K file association
Linux: Update mime-type associations to not use MicroStation for .j2k files

Application sandboxing

all

Run MicroStation in a restricted environment or sandbox

Windows: Use Windows Sandbox or third-party application containment tools
Linux: Use firejail or similar sandboxing tools

🧯 If You Can't Patch

  • Implement strict file type filtering at email gateways and web proxies to block J2K files
  • Educate users to never open J2K files from untrusted sources and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check MicroStation version: Open MicroStation, go to Help > About, verify version is 10.16.0.80 or earlier

Check Version:

Windows: Check registry at HKEY_LOCAL_MACHINE\SOFTWARE\Bentley\MicroStation\Version | Linux: Check installation directory for version file

Verify Fix Applied:

Verify version is 10.16.1.0 or later in Help > About dialog

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening J2K files
  • Unexpected process creation from MicroStation executable
  • Memory access violation errors in application logs

Network Indicators:

  • Downloads of J2K files from untrusted sources
  • Outbound connections from MicroStation to suspicious IPs

SIEM Query:

source="MicroStation" AND (event_type="crash" OR process_name="ms.exe" AND parent_process!="explorer.exe")

🔗 References

📤 Share & Export