Remote Code Execution Risk in Bentley MicroStation CONNECT Software
CVE-2022-28313

3.3LOW

Key Information:

Vendor
Bentley
Vendor
CVE Published:
29 March 2023

Summary

The vulnerability in Bentley MicroStation CONNECT involves a buffer overflow that may allow remote attackers to disclose sensitive information. This flaw occurs during the parsing of 3DS files, where crafted data can lead to reading past the end of an allocated buffer. Exploitation requires user action, as the target must open a malicious file or visit a harmful page. This vulnerability can be combined with other issues, potentially enabling attackers to execute arbitrary code within the context of the affected process.

Affected Version(s)

MicroStation CONNECT 10.16.02.034

References

CVSS V3.1

Score:
3.3
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

CVSS V3.0

Score:
3.3
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Mat Powell of Trend Micro Zero Day Initiative
.