CVE-2021-46617

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Bentley MicroStation CONNECT installations by tricking users into opening malicious TIF image files. The flaw exists in improper memory initialization during TIF parsing, enabling code execution in the current process context. Users of affected Bentley MicroStation versions are at risk.

💻 Affected Systems

Products:
  • Bentley MicroStation CONNECT
Versions: 10.16.0.80 and earlier versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attacker executes malicious code with the privileges of the current user, potentially installing malware, stealing sensitive project data, or establishing persistence on the system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash rather than code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once malicious file is opened. No authentication required for the exploit itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.16.0.80 or later patched versions

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0015

Restart Required: Yes

Instructions:

1. Download latest MicroStation CONNECT version from Bentley website. 2. Run installer with administrative privileges. 3. Restart system after installation completes.

🔧 Temporary Workarounds

Disable TIF file association

windows

Prevent MicroStation from automatically opening TIF files by changing file associations

Control Panel > Default Programs > Associate a file type or protocol with a program > Change .tif association to another application

Application sandboxing

all

Run MicroStation in restricted environment to limit potential damage

🧯 If You Can't Patch

  • Implement strict file type filtering to block TIF files at email gateways and web proxies
  • Educate users to never open TIF files from untrusted sources and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check MicroStation version in Help > About. If version is 10.16.0.80 or earlier, system is vulnerable.

Check Version:

In MicroStation: Help > About or check program properties in Windows

Verify Fix Applied:

Verify version is updated beyond 10.16.0.80 and test opening known safe TIF files to ensure functionality remains.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening TIF files
  • Unusual process spawning from MicroStation
  • Memory access violation errors in application logs

Network Indicators:

  • Downloads of TIF files from suspicious sources
  • Outbound connections from MicroStation to unknown IPs

SIEM Query:

source="*microstation*" AND (event_type="crash" OR process_name="*tif*")

🔗 References

📤 Share & Export