Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-46575 : What You Need to Know

Learn about CVE-2021-46575, a high-severity vulnerability in Bentley MicroStation CONNECT allowing remote attackers to execute arbitrary code. Find mitigation steps and affected versions.

This CVE involves a vulnerability in Bentley MicroStation CONNECT that allows remote attackers to execute arbitrary code. The issue is triggered by the parsing of DGN files without proper object validation.

Understanding CVE-2021-46575

This CVE poses a high-risk threat due to its potential impact on the confidentiality, integrity, and availability of affected systems.

What is CVE-2021-46575?

CVE-2021-46575 allows attackers to run unauthorized code on Bentley MicroStation CONNECT 10.16.0.80 installations. It mandates user interaction through visiting a malicious site or opening an infected file, primarily affecting systems parsing DGN files.

The Impact of CVE-2021-46575

The vulnerability has a high base severity score of 7.8 (High) and requires no privileges for exploitation, with a high impact on confidentiality, integrity, and availability, necessitating immediate attention and mitigation.

Technical Details of CVE-2021-46575

This section delves into the technical specifics of the vulnerability in Bentley MicroStation CONNECT.

Vulnerability Description

The flaw lies in the inadequate validation of object existence before operations are performed, leading to the execution of arbitrary code by attackers.

Affected Systems and Versions

        Product: MicroStation CONNECT
        Vendor: Bentley
        Vulnerable Version: 10.16.0.80

Exploitation Mechanism

        Attack Complexity: Low
        Attack Vector: Local
        User Interaction: Required
        Scope: Unchanged
        Availability Impact: High
        Confidentiality Impact: High
        Integrity Impact: High

Mitigation and Prevention

Addressing CVE-2021-46575 is critical to safeguard affected systems and data.

Immediate Steps to Take

        Update Bentley MicroStation CONNECT to a patched version immediately.
        Educate users on avoiding suspicious websites and files.
        Implement network controls to prevent unauthorized access.

Long-Term Security Practices

        Regularly monitor and update security patches.
        Conduct security training for employees on identifying potential threats.

Patching and Updates

        Apply security patches and updates released by Bentley promptly to mitigate the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now