CVE-2021-46633

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Bentley MicroStation CONNECT's PDF parser that allows remote code execution. Attackers can exploit it by tricking users into opening malicious PDF files, potentially compromising affected systems. Users of Bentley MicroStation CONNECT 10.16.0.80 are affected.

💻 Affected Systems

Products:
  • Bentley MicroStation CONNECT
Versions: 10.16.0.80
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: User interaction required - victim must open malicious PDF file. All installations of affected version are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected MicroStation installation and potentially the underlying system.

🟠

Likely Case

Attacker executes arbitrary code in the context of the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟢

If Mitigated

Limited impact if proper application sandboxing, least privilege principles, and network segmentation are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction but no authentication. ZDI advisory suggests weaponization is likely given the nature of the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 10.16.02.58 or later

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0003

Restart Required: Yes

Instructions:

1. Download latest MicroStation CONNECT update from Bentley's official site. 2. Run installer with administrative privileges. 3. Restart system after installation completes.

🔧 Temporary Workarounds

Disable PDF file association

windows

Prevent MicroStation from automatically opening PDF files by changing file associations

Control Panel > Default Programs > Associate a file type or protocol with a program > Change .pdf to open with different application

Implement application control

windows

Use Windows AppLocker or similar to restrict MicroStation from executing untrusted PDF files

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MicroStation systems
  • Apply principle of least privilege - run MicroStation with minimal user permissions

🔍 How to Verify

Check if Vulnerable:

Check MicroStation version via Help > About. If version is exactly 10.16.0.80, system is vulnerable.

Check Version:

In MicroStation: Help > About MicroStation CONNECT

Verify Fix Applied:

Verify version is 10.16.02.58 or later via Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of MicroStation
  • Suspicious child processes spawned from MicroStation
  • Unusual file access patterns from MicroStation process

Network Indicators:

  • Outbound connections from MicroStation to unknown external IPs
  • DNS requests for suspicious domains from MicroStation host

SIEM Query:

Process Creation where ParentImage contains 'MicroStation' AND (CommandLine contains '.pdf' OR Image contains suspicious patterns)

🔗 References

📤 Share & Export