CVE-2022-43653

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SKP files in Bentley View. Attackers can exploit an out-of-bounds write during SKP file parsing to gain code execution in the current process context. All users running vulnerable versions of Bentley View are affected.

💻 Affected Systems

Products:
  • Bentley View
Versions: Versions prior to the patched release (specific version numbers not provided in available references)
Operating Systems: Windows, Linux, macOS (if Bentley View supports these platforms)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default SKP file parsing functionality. All installations with SKP file support are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malicious actor gains code execution at the user's privilege level, enabling data exfiltration, credential theft, or installation of persistent malware.

🟢

If Mitigated

With proper controls, exploitation is limited to user-level access only, preventing system-wide compromise but still allowing data theft from the user's context.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (opening malicious file) but the vulnerability itself is unauthenticated. The ZDI advisory suggests weaponization is likely given the nature of the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Bentley Systems advisory for specific patched version

Vendor Advisory: https://www.bentley.com/

Restart Required: Yes

Instructions:

1. Visit Bentley Systems official website
2. Check for security advisories related to CVE-2022-43653
3. Download and install the latest patched version of Bentley View
4. Restart the application and system if required

🔧 Temporary Workarounds

Disable SKP file association

all

Remove Bentley View as the default handler for SKP files to prevent automatic opening

Windows: Control Panel > Default Programs > Set Associations > Remove .skp association with Bentley View
Linux/macOS: Update mime types to not associate .skp with Bentley View

Application control blocking

all

Use application control solutions to block execution of Bentley View from untrusted locations

🧯 If You Can't Patch

  • Implement strict file type filtering to block SKP files at email gateways and web proxies
  • Educate users to never open SKP files from untrusted sources and disable automatic file opening

🔍 How to Verify

Check if Vulnerable:

Check Bentley View version against patched version in vendor advisory

Check Version:

Bentley View: Help > About or check application properties

Verify Fix Applied:

Verify installed version matches or exceeds the patched version specified in Bentley's advisory

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed SKP file parsing attempts
  • Unexpected Bentley View crashes with memory access violations
  • Process creation from Bentley View with unusual command lines

Network Indicators:

  • Downloads of SKP files from untrusted sources
  • Outbound connections from Bentley View to suspicious IPs

SIEM Query:

Process: 'Bentley View' AND (EventID: 1000 OR EventID: 1001) AND ExceptionCode: 0xC0000005

🔗 References

📤 Share & Export