First published: Fri Jan 06 2023(Updated: )
Bentley Systems MicroStation Connect versions 10.17.0.209 and prior are vulnerable to a Stack-Based Buffer Overflow when a malformed design (DGN) file is parsed. This may allow an attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Bentley MicroStation CONNECT | <=10.17.0.209 | |
Bentley Systems CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing | ||
Bentley Systems COUNTRIES/AREAS DEPLOYED: Worldwide | ||
Bentley Systems COMPANY HEADQUARTERS LOCATION: United States |
Bentley Systems has implemented multiple validation checks within the DGN platform when processing malformed DGNs. Bentley Systems recommends users update to the latest version of the MicroStation Connect: * MicroStation Connect Update 17.1 For more information and MicroStation updates, contact Bentley Support https://www.bentley.com/support/ .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Bentley Systems MicroStation Connect is CVE-2022-40201.
The severity rating of CVE-2022-40201 is high with a severity value of 7.8.
Bentley Systems MicroStation Connect versions 10.17.0.209 and prior are affected by CVE-2022-40201.
CVE-2022-40201 allows an attacker to execute arbitrary code through a stack-based buffer overflow when parsing a malformed design (DGN) file.
No specific fix information is provided in the given context. Please refer to the official references provided for more information on available patches or updates.