First published: Fri Jan 06 2023(Updated: )
Bentley Systems MicroStation Connect versions 10.17.0.209 and prior are vulnerable to an Out-of-Bounds Read when when parsing DGN files, which may allow an attacker to crash the product, disclose sensitive information, or execute arbitrary code.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Bentley MicroStation CONNECT | <=10.17.0.209 | |
Bentley Systems CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing | ||
Bentley Systems COUNTRIES/AREAS DEPLOYED: Worldwide | ||
Bentley Systems COMPANY HEADQUARTERS LOCATION: United States |
Bentley Systems has implemented multiple validation checks within the DGN platform when processing malformed DGNs. Bentley Systems recommends users update to the latest version of the MicroStation Connect: * MicroStation Connect Update 17.1 For more information and MicroStation updates, contact Bentley Support https://www.bentley.com/support/ .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41613 is a vulnerability in Bentley Systems MicroStation Connect versions 10.17.0.209 and prior that allows an attacker to crash the product, disclose sensitive information, or execute arbitrary code.
CVE-2022-41613 affects Bentley Systems MicroStation Connect versions 10.17.0.209 and prior by causing an Out-of-Bounds Read vulnerability when parsing DGN files.
CVE-2022-41613 has a severity rating of 7.8, which is considered high.
An attacker can exploit CVE-2022-41613 by crafting a malicious DGN file that triggers the Out-of-Bounds Read vulnerability in Bentley Systems MicroStation Connect.
A fix or patch for CVE-2022-41613 is not currently available. It is recommended to follow the mitigation steps provided by the vendor and monitor for updates.