CVE-2022-28303
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SKP files in Bentley View. Attackers can gain control of the current process, potentially compromising the entire system. Users of affected Bentley View versions are at risk.
💻 Affected Systems
- Bentley View
📦 What is this software?
View by Bentley
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control, data theft, ransomware deployment, and lateral movement within the network.
Likely Case
Local privilege escalation leading to data exfiltration, malware installation, or system disruption for the affected user.
If Mitigated
Limited impact to isolated system with proper application sandboxing and user privilege restrictions.
🎯 Exploit Status
Exploitation requires user interaction but is technically simple once malicious file is opened. ZDI has confirmed the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.16.03.01 or later
Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0009
Restart Required: Yes
Instructions:
1. Download latest Bentley View from official Bentley website. 2. Run installer. 3. Restart system after installation completes.
🔧 Temporary Workarounds
Disable SKP file association
windowsPrevent Bentley View from automatically opening SKP files
Control Panel > Default Programs > Associate a file type or protocol with a program > Change .skp association to Notepad or other safe viewer
Application sandboxing
windowsRun Bentley View in restricted environment
🧯 If You Can't Patch
- Implement strict email/web filtering to block SKP attachments
- Educate users to never open SKP files from untrusted sources
🔍 How to Verify
Check if Vulnerable:
Check Bentley View version in Help > About. If version is 10.16.02.022 or earlier, system is vulnerable.
Check Version:
Not applicable - check via GUI Help > About menu
Verify Fix Applied:
Verify version is 10.16.03.01 or later in Help > About.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed SKP file parsing attempts
- Unexpected process creation from Bentley View
Network Indicators:
- Downloads of SKP files from suspicious sources
- Outbound connections from Bentley View to unknown IPs
SIEM Query:
process_name:"Bentley View" AND (file_extension:".skp" OR parent_process:explorer.exe)