CVE-2021-46603

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by exploiting a heap-based buffer overflow in Bentley MicroStation CONNECT's J2K image parser. Attackers can achieve remote code execution by tricking users into opening malicious J2K files or visiting malicious web pages. Users of affected Bentley MicroStation CONNECT versions are at risk.

💻 Affected Systems

Products:
  • Bentley MicroStation CONNECT
Versions: 10.16.0.80 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default when processing J2K images.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Remote code execution in the context of the current user, allowing attackers to install malware, steal sensitive data, or use the system as a foothold for further attacks.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially containing the exploit to the application's process space.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file or visiting malicious page). The vulnerability is well-documented and was assigned ZDI-CAN-15397.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.16.0.80 or later (check vendor for specific fixed version)

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0006

Restart Required: Yes

Instructions:

1. Download the latest version from Bentley's official website. 2. Run the installer with administrative privileges. 3. Follow the installation wizard. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Disable J2K file association

windows

Remove J2K file type association with MicroStation to prevent automatic opening of malicious files.

Control Panel > Default Programs > Associate a file type or protocol with a program > Select .j2k > Change program > Choose another program

Application sandboxing

windows

Run MicroStation in a sandboxed environment to limit potential damage from exploitation.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MicroStation systems from critical assets
  • Deploy application control policies to prevent execution of unauthorized binaries from MicroStation process

🔍 How to Verify

Check if Vulnerable:

Check MicroStation version in Help > About MicroStation. If version is 10.16.0.80 or earlier, the system is vulnerable.

Check Version:

In MicroStation: Help > About MicroStation

Verify Fix Applied:

Verify version is updated to 10.16.0.80 or later in Help > About MicroStation and test opening legitimate J2K files.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing J2K files
  • Unusual process creation from MicroStation executable
  • Memory access violation errors in application logs

Network Indicators:

  • Downloads of J2K files from untrusted sources
  • Outbound connections from MicroStation to unknown IPs

SIEM Query:

Process Creation where Parent Process Name contains 'MicroStation' AND (Command Line contains '.j2k' OR Image contains suspicious patterns)

🔗 References

📤 Share & Export