CVE-2022-43655

7.8 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in Bentley View's FBX file parser allows remote attackers to execute arbitrary code when users open malicious FBX files. This affects users of Bentley View software who process untrusted FBX files. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Bentley View
Versions: Versions prior to 10.16.02
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations processing FBX files are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Bentley View process, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware installation on the affected workstation, potentially leading to credential theft or data exfiltration.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash but no code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability is well-documented and weaponization is likely given the RCE potential.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.16.02 and later

Vendor Advisory: https://www.bentley.com/en/common-vulnerability-exposure/CVE-2022-43655

Restart Required: Yes

Instructions:

1. Download Bentley View version 10.16.02 or later from official Bentley website. 2. Run the installer with administrative privileges. 3. Restart the system after installation completes.

🔧 Temporary Workarounds

Disable FBX file association

windows

Remove Bentley View as the default handler for FBX files to prevent automatic opening

Control Panel > Default Programs > Associate a file type or protocol with a program > Select .fbx > Change program > Choose different application

Application sandboxing

all

Run Bentley View in a restricted environment or sandbox

🧯 If You Can't Patch

  • Implement strict file type filtering at email gateways and web proxies to block FBX files
  • Educate users to never open FBX files from untrusted sources and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check Bentley View version in Help > About. If version is earlier than 10.16.02, the system is vulnerable.

Check Version:

In Bentley View: Help > About, or check installed programs in Control Panel

Verify Fix Applied:

Verify version is 10.16.02 or later in Help > About and test opening known safe FBX files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected process creation from Bentley View executable
  • Failed attempts to open corrupted FBX files

Network Indicators:

  • Downloads of FBX files from suspicious sources
  • Outbound connections from Bentley View to unknown IPs

SIEM Query:

source="bentley_view.log" AND (event="crash" OR event="memory_access_violation") OR process_name="bentleyview.exe" AND child_process_created=true

🔗 References

📤 Share & Export