CVE-2022-28307

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in Bentley View. The flaw is an out-of-bounds read during DXF file parsing that can lead to code execution. Users of Bentley View 10.16.02.022 are affected.

💻 Affected Systems

Products:
  • Bentley View
Versions: 10.16.02.022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: User interaction required - victim must open malicious DXF file or visit malicious webpage that triggers file opening.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attacker executes malicious code with the privileges of the current user, potentially stealing sensitive data, installing malware, or using the system as a foothold for further attacks.

🟢

If Mitigated

If proper controls are in place, impact is limited to the user's privileges and isolated to the affected workstation with minimal data exposure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction but the vulnerability is well-documented and weaponization is likely given the RCE potential.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version (check Bentley advisory)

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0005

Restart Required: Yes

Instructions:

1. Download latest Bentley View update from official Bentley website. 2. Run installer with administrative privileges. 3. Restart system after installation completes.

🔧 Temporary Workarounds

Restrict DXF file handling

windows

Configure system to open DXF files with alternative software or block DXF file execution in Bentley View

Use Windows Group Policy to modify file associations for .dxf files

User awareness training

all

Train users to avoid opening DXF files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized code execution
  • Use network segmentation to isolate Bentley View workstations from critical systems

🔍 How to Verify

Check if Vulnerable:

Check Bentley View version in Help > About. If version is 10.16.02.022, system is vulnerable.

Check Version:

In Bentley View: Help > About or check program properties in Windows

Verify Fix Applied:

Verify Bentley View version is updated beyond 10.16.02.022 and test with known safe DXF files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Bentley View
  • Multiple failed DXF file parsing attempts
  • Out-of-memory errors in application logs

Network Indicators:

  • Unexpected outbound connections from Bentley View process
  • Downloads of DXF files from suspicious sources

SIEM Query:

Process creation where parent_process contains 'bentley' AND (process contains 'cmd' OR process contains 'powershell')

🔗 References

📤 Share & Export