CVE-2021-46601

7.8 HIGH

📋 TL;DR

This vulnerability in Bentley MicroStation CONNECT allows remote attackers to execute arbitrary code by tricking users into opening malicious JT files. The flaw exists in JT file parsing where the software fails to validate object existence before operations, leading to use-after-free conditions. Users of affected Bentley MicroStation versions are at risk.

💻 Affected Systems

Products:
  • Bentley MicroStation CONNECT
Versions: 10.16.0.80 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Primarily affects Windows installations; requires user interaction to open malicious JT files

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Local privilege escalation or arbitrary code execution within the context of the MicroStation process, potentially allowing file system access, data exfiltration, or installation of malware.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash rather than code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) but no authentication; weaponization likely given the nature of the vulnerability and ZDI disclosure

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.16.0.80 or later updates

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005

Restart Required: Yes

Instructions:

1. Download latest MicroStation CONNECT update from Bentley Systems 2. Install the update following vendor instructions 3. Restart the application and system if prompted

🔧 Temporary Workarounds

Restrict JT file handling

windows

Configure system to open JT files with alternative applications or in sandboxed environments

Use Windows Group Policy to modify file associations for .jt files

Application control

windows

Implement application whitelisting to restrict MicroStation execution to trusted locations

🧯 If You Can't Patch

  • Implement strict user privilege restrictions (run MicroStation with least privilege)
  • Deploy application sandboxing or virtualization for MicroStation processes

🔍 How to Verify

Check if Vulnerable:

Check MicroStation version via Help > About; versions 10.16.0.80 and earlier are vulnerable

Check Version:

In MicroStation: Help > About or check program properties

Verify Fix Applied:

Verify version is updated to 10.16.0.80 or later; test with known safe JT files to ensure proper parsing

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected process creation from MicroStation
  • Suspicious file access patterns

Network Indicators:

  • Unexpected outbound connections from MicroStation process
  • Downloads of JT files from untrusted sources

SIEM Query:

Process creation where parent_process contains 'MicroStation' AND (command_line contains '.jt' OR file_path contains '.jt')

🔗 References

📤 Share & Export