Remote Code Execution Risk in Bentley MicroStation CONNECT Software
CVE-2022-28313
3.3LOW
Summary
The vulnerability in Bentley MicroStation CONNECT involves a buffer overflow that may allow remote attackers to disclose sensitive information. This flaw occurs during the parsing of 3DS files, where crafted data can lead to reading past the end of an allocated buffer. Exploitation requires user action, as the target must open a malicious file or visit a harmful page. This vulnerability can be combined with other issues, potentially enabling attackers to execute arbitrary code within the context of the affected process.
Affected Version(s)
MicroStation CONNECT 10.16.02.034
References
CVSS V3.1
Score:
3.3
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
CVSS V3.0
Score:
3.3
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Mat Powell of Trend Micro Zero Day Initiative