CVE-2021-46609

7.8 HIGH

📋 TL;DR

CVE-2021-46609 is a use-after-free vulnerability in Bentley MicroStation CONNECT's PDF parser that allows remote code execution. Attackers can exploit this by tricking users into opening malicious PDF files, potentially compromising affected systems. Users of Bentley MicroStation CONNECT version 10.16.0.80 are affected.

💻 Affected Systems

Products:
  • Bentley MicroStation CONNECT
Versions: 10.16.0.80
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability affects the PDF parsing functionality within MicroStation CONNECT. All installations with the vulnerable version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected MicroStation installation and potentially the underlying operating system.

🟠

Likely Case

Attacker executes arbitrary code in the context of the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟢

If Mitigated

If proper controls are in place, exploitation is prevented through patching, application whitelisting, or network segmentation, limiting impact to isolated systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (opening malicious PDF) but is otherwise straightforward. The vulnerability was discovered by Zero Day Initiative (ZDI-CAN-15403).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 10.16.02.58 or later

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0003

Restart Required: Yes

Instructions:

1. Download the latest MicroStation CONNECT update from Bentley's official website or through the Bentley CONNECTION Client. 2. Run the installer with administrative privileges. 3. Restart the system after installation completes.

🔧 Temporary Workarounds

Disable PDF file association

windows

Prevent MicroStation from automatically opening PDF files by changing file associations

Control Panel > Default Programs > Associate a file type or protocol with a program > Change .pdf to open with a different application

Application control policy

windows

Implement application whitelisting to prevent execution of unauthorized PDF files

Use Windows AppLocker or similar solution to restrict PDF execution

🧯 If You Can't Patch

  • Implement network segmentation to isolate MicroStation systems from critical infrastructure
  • Deploy endpoint detection and response (EDR) solutions to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check MicroStation version by opening the application and navigating to Help > About MicroStation

Check Version:

Not applicable - check through application GUI

Verify Fix Applied:

Verify the version is 10.16.02.58 or later in Help > About MicroStation

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from MicroStation executable
  • Multiple failed PDF parsing attempts in application logs
  • Unexpected network connections from MicroStation process

Network Indicators:

  • Outbound connections from MicroStation to unexpected external IPs
  • Unusual DNS queries from systems running MicroStation

SIEM Query:

Process Creation where (Image contains 'ustation.exe' OR ParentImage contains 'ustation.exe') AND CommandLine contains '.pdf'

🔗 References

📤 Share & Export