Learn about CVE-2021-46575, a high-severity vulnerability in Bentley MicroStation CONNECT allowing remote attackers to execute arbitrary code. Find mitigation steps and affected versions.
This CVE involves a vulnerability in Bentley MicroStation CONNECT that allows remote attackers to execute arbitrary code. The issue is triggered by the parsing of DGN files without proper object validation.
Understanding CVE-2021-46575
This CVE poses a high-risk threat due to its potential impact on the confidentiality, integrity, and availability of affected systems.
What is CVE-2021-46575?
CVE-2021-46575 allows attackers to run unauthorized code on Bentley MicroStation CONNECT 10.16.0.80 installations. It mandates user interaction through visiting a malicious site or opening an infected file, primarily affecting systems parsing DGN files.
The Impact of CVE-2021-46575
The vulnerability has a high base severity score of 7.8 (High) and requires no privileges for exploitation, with a high impact on confidentiality, integrity, and availability, necessitating immediate attention and mitigation.
Technical Details of CVE-2021-46575
This section delves into the technical specifics of the vulnerability in Bentley MicroStation CONNECT.
Vulnerability Description
The flaw lies in the inadequate validation of object existence before operations are performed, leading to the execution of arbitrary code by attackers.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Addressing CVE-2021-46575 is critical to safeguard affected systems and data.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates