10.17.0.209 and prior are vulnerable to a Stack-Based Buffer Overflow when a malformed design (DGN) file is parsed. This may allow an attacker to execute arbitrary code.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-43501 | Bentley Systems MicroStation Connect versions 10.17.0.209 and prior are vulnerable to a Stack-Based Buffer Overflow when a malformed design (DGN) file is parsed. This may allow an attacker to execute arbitrary code. |
Solution
Bentley Systems has implemented multiple validation checks within the DGN platform when processing malformed DGNs. Bentley Systems recommends users update to the latest version of the MicroStation Connect: * MicroStation Connect Update 17.1 For more information and MicroStation updates, contact Bentley Support https://www.bentley.com/support/ .
Workaround
No workaround given by the vendor.
Fri, 14 Feb 2025 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:bentley:microstation_connect:-:*:*:*:*:*:*:* | |
Metrics |
ssvc
|
Thu, 13 Feb 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Bentley Systems MicroStation Connect versions 10.17.0.209 and prior are vulnerable to a Stack-Based Buffer Overflow when a malformed design (DGN) file is parsed. This may allow an attacker to execute arbitrary code. | Bentley Systems MicroStation Connect versions 10.17.0.209 and prior are vulnerable to a Stack-Based Buffer Overflow when a malformed design (DGN) file is parsed. This may allow an attacker to execute arbitrary code. |

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-02-13T16:33:01.388Z
Reserved: 2022-09-29T14:08:03.156Z
Link: CVE-2022-40201

Updated: 2024-08-03T12:14:39.671Z

Status : Modified
Published: 2023-01-06T22:15:09.320
Modified: 2025-02-13T17:15:43.300
Link: CVE-2022-40201

No data.

No data.