CVE-2021-46652
📋 TL;DR
CVE-2021-46652 is a buffer overflow vulnerability in Bentley View's DGN file parser that allows remote code execution. Attackers can exploit it by tricking users into opening malicious DGN files, potentially compromising systems running vulnerable versions. This affects Bentley View users who process untrusted DGN files.
💻 Affected Systems
- Bentley View
📦 What is this software?
View by Bentley
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control over the affected system, data theft, ransomware deployment, and lateral movement within the network.
Likely Case
Local privilege escalation leading to data exfiltration, installation of persistent malware, or use as an initial access vector for targeted attacks.
If Mitigated
Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash without code execution.
🎯 Exploit Status
Requires user interaction to open malicious file. The vulnerability is well-documented and was disclosed through ZDI, increasing likelihood of weaponization.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Bentley View 10.16.0.80 or later
Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0009
Restart Required: Yes
Instructions:
1. Download latest Bentley View from official Bentley website. 2. Run installer with administrative privileges. 3. Complete installation wizard. 4. Restart system to ensure all components are updated.
🔧 Temporary Workarounds
Disable DGN file association
windowsPrevent Bentley View from automatically opening DGN files by changing file associations
Windows: Control Panel > Default Programs > Associate a file type or protocol with a program > Change .dgn to open with Notepad or another safe application
Application sandboxing
windowsRun Bentley View in restricted environment to limit potential damage
Windows Sandbox or similar virtualization/sandboxing tools
🧯 If You Can't Patch
- Implement strict email filtering to block DGN attachments from untrusted sources
- Apply principle of least privilege: run Bentley View with limited user accounts, not administrative privileges
🔍 How to Verify
Check if Vulnerable:
Check Bentley View version in Help > About. If version is 10.15.0.75 or earlier, system is vulnerable.
Check Version:
Windows: Check Help > About in Bentley View GUI. Linux: Check application version in about dialog.
Verify Fix Applied:
Verify version is 10.16.0.80 or later in Help > About menu.
📡 Detection & Monitoring
Log Indicators:
- Application crashes with memory access violations
- Unexpected child processes spawned from Bentley View
- Unusual file access patterns from Bentley View process
Network Indicators:
- Outbound connections from Bentley View to unknown IPs
- DNS requests for suspicious domains following DGN file processing
SIEM Query:
Process Creation where Parent Process Name contains 'BentleyView' AND (Command Line contains '.dgn' OR Image contains suspicious patterns)