CVE-2021-46635

7.8 HIGH

📋 TL;DR

CVE-2021-46635 is a buffer overflow vulnerability in Bentley MicroStation CONNECT's DGN file parser that allows remote code execution. Attackers can exploit this by tricking users into opening malicious DGN files, potentially compromising affected systems. Users of Bentley MicroStation CONNECT version 10.16.0.80 are primarily affected.

💻 Affected Systems

Products:
  • Bentley MicroStation CONNECT
Versions: 10.16.0.80
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open malicious DGN file. All installations of the affected version are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the affected workstation, potentially leading to lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware installation on the user's system, data theft, or ransomware deployment.

🟢

If Mitigated

Limited impact with proper network segmentation, application sandboxing, and user awareness training preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction but the vulnerability is well-documented and was disclosed through ZDI. Weaponization is likely given the RCE potential.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 10.16.02.34 or later

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0009

Restart Required: Yes

Instructions:

1. Download the latest version from Bentley's official website or update through Bentley CONNECTION Client. 2. Run the installer with administrative privileges. 3. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict DGN file handling

windows

Configure system to open DGN files with alternative software or in sandboxed environments

Use Windows Group Policy to modify file associations for .dgn files

Application control policies

windows

Implement application whitelisting to prevent unauthorized execution of MicroStation

Configure Windows AppLocker or similar application control solution

🧯 If You Can't Patch

  • Implement network segmentation to isolate MicroStation workstations from critical systems
  • Deploy endpoint detection and response (EDR) solutions to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check MicroStation version via Help > About menu or examine installed programs in Control Panel

Check Version:

wmic product where name="MicroStation CONNECT" get version

Verify Fix Applied:

Verify version is 10.16.02.34 or later in Help > About menu

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from MicroStation executable
  • Multiple failed DGN file parsing attempts
  • Abnormal memory usage patterns in MicroStation process

Network Indicators:

  • External downloads of DGN files from untrusted sources
  • Unusual outbound connections from MicroStation workstations

SIEM Query:

source="windows" AND process_name="ustation.exe" AND (event_id=4688 OR event_id=1) AND parent_process!="explorer.exe"

🔗 References

📤 Share & Export