Remote Code Execution Vulnerability in Bentley View by Bentley Systems
CVE-2021-46656
7.8HIGH
Summary
This vulnerability in Bentley View allows remote attackers to execute arbitrary code by exploiting the parsing of JT files. To be successful, the target user must interact with a malicious link or file, which leads to crafted data triggering a write past the allocated buffer's boundary. This flaw can enable an attacker to run code within the context of the affected process, potentially compromising system integrity. For more information, see the relevant advisories from Bentley Systems and Zero Day Initiative.
Affected Version(s)
View 10.15.0.75
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Mat Powell of Trend Micro Zero Day Initiative