CVE-2022-28305
📋 TL;DR
This is a stack-based buffer overflow vulnerability in Bentley MicroStation CONNECT that allows remote code execution when users open malicious OBJ files. Attackers can exploit it to run arbitrary code with the privileges of the current user. Affects users of Bentley MicroStation CONNECT version 10.16.02.034.
💻 Affected Systems
- Bentley MicroStation CONNECT
📦 What is this software?
View by Bentley
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Local privilege escalation leading to unauthorized access to sensitive design files, system resources, and potential installation of persistent malware.
If Mitigated
Limited impact with potential application crash but no code execution if proper memory protections are enabled.
🎯 Exploit Status
User interaction required but exploitation is straightforward once malicious file is opened. ZDI-CAN-16172 indicates professional vulnerability research.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to version beyond 10.16.02.034
Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0008
Restart Required: Yes
Instructions:
1. Download latest MicroStation CONNECT update from Bentley Systems. 2. Run installer with administrative privileges. 3. Restart system after installation completes.
🔧 Temporary Workarounds
Block OBJ file extensions
windowsPrevent MicroStation from processing OBJ files via file association blocking
reg add "HKLM\SOFTWARE\Classes\.obj" /v "Content Type" /t REG_SZ /d "application/octet-stream" /f
Restrict file opening privileges
windowsConfigure MicroStation to run with reduced privileges using application control policies
🧯 If You Can't Patch
- Implement strict email filtering to block OBJ attachments
- Deploy application whitelisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check MicroStation version via Help > About. If version is exactly 10.16.02.034, system is vulnerable.
Check Version:
In MicroStation: Help > About or check registry: HKEY_LOCAL_MACHINE\SOFTWARE\Bentley\MicroStation\Version
Verify Fix Applied:
Verify version is updated beyond 10.16.02.034 and test with known safe OBJ files to ensure proper parsing.
📡 Detection & Monitoring
Log Indicators:
- Application crashes when parsing OBJ files
- Unexpected process creation from MicroStation.exe
- Memory access violation errors in Windows Event Logs
Network Indicators:
- Downloads of OBJ files from untrusted sources
- Outbound connections from MicroStation process to unknown IPs
SIEM Query:
EventID=1000 OR EventID=1001 AND ProcessName="MicroStation.exe" AND ExceptionCode="0xc0000005"