BE-2022-0011: DGN File Parsing Out-of-bounds Read Vulnerabilities in MicroStation and MicroStation-based applications
Bentley ID: BE-2022-0011
CVE ID: CVE-2022-35906
CVSS v3.1: AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Publication date: 2022-07-13
Revision date: 2022-07-13
MicroStation and MicroStation-based applications may be affected by out-of-bounds read vulnerabilities when opening maliciously crafted DGN files. Exploiting these vulnerabilities could lead to information disclosure.
Using an affected version of MicroStation or MicroStation-based application to open a DGN file containing maliciously crafted data can force an out-of-bounds read. Exploitation of these vulnerabilities within the parsing of DGN files could enable an attacker to read information in the context of the current process.
|Applications||Affected Versions||Mitigated Versions|
|MicroStation||10.16.* and prior versions||10.17.0.* and more recent|
|Bentley View||10.16.* and prior versions||10.17.0.* and more recent|
Bentley recommends updating to the latest versions of MicroStation and MicroStation-based applications. As a general best practice, it is also recommended to only open DGN files coming from trusted sources.
Thanks to xina1i for discovering these vulnerabilities.
|2022-07-13||First version of this advisory|
|2022-07-18||Adding CVE number|