CVE-2022-28307
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in Bentley View. The flaw is an out-of-bounds read during DXF file parsing that can lead to code execution. Users of Bentley View 10.16.02.022 are affected.
💻 Affected Systems
- Bentley View
📦 What is this software?
View by Bentley
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Attacker executes malicious code with the privileges of the current user, potentially stealing sensitive data, installing malware, or using the system as a foothold for further attacks.
If Mitigated
If proper controls are in place, impact is limited to the user's privileges and isolated to the affected workstation with minimal data exposure.
🎯 Exploit Status
Exploitation requires user interaction but the vulnerability is well-documented and weaponization is likely given the RCE potential.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to latest version (check Bentley advisory)
Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0005
Restart Required: Yes
Instructions:
1. Download latest Bentley View update from official Bentley website. 2. Run installer with administrative privileges. 3. Restart system after installation completes.
🔧 Temporary Workarounds
Restrict DXF file handling
windowsConfigure system to open DXF files with alternative software or block DXF file execution in Bentley View
Use Windows Group Policy to modify file associations for .dxf files
User awareness training
allTrain users to avoid opening DXF files from untrusted sources
🧯 If You Can't Patch
- Implement application whitelisting to prevent unauthorized code execution
- Use network segmentation to isolate Bentley View workstations from critical systems
🔍 How to Verify
Check if Vulnerable:
Check Bentley View version in Help > About. If version is 10.16.02.022, system is vulnerable.
Check Version:
In Bentley View: Help > About or check program properties in Windows
Verify Fix Applied:
Verify Bentley View version is updated beyond 10.16.02.022 and test with known safe DXF files.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from Bentley View
- Multiple failed DXF file parsing attempts
- Out-of-memory errors in application logs
Network Indicators:
- Unexpected outbound connections from Bentley View process
- Downloads of DXF files from suspicious sources
SIEM Query:
Process creation where parent_process contains 'bentley' AND (process contains 'cmd' OR process contains 'powershell')