Skip to main content

CVE-2022-42901: n/a in n/a

High
VulnerabilityCVE-2022-42901cvecve-2022-42901
Published: Thu Oct 13 2022 (10/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Bentley MicroStation and MicroStation-based applications may be affected by out-of-bounds and stack overflow issues when opening crafted XMT files. Exploiting these issues could lead to information disclosure and code execution. The fixed versions are 10.17.01.58* for MicroStation and 10.17.01.19* for Bentley View.

AI-Powered Analysis

AILast updated: 07/04/2025, 19:28:02 UTC

Technical Analysis

CVE-2022-42901 is a high-severity vulnerability affecting Bentley MicroStation and MicroStation-based applications, including Bentley View. The vulnerability arises from out-of-bounds and stack overflow issues triggered when processing specially crafted XMT files. These file parsing flaws can be exploited by an attacker to cause memory corruption, potentially leading to arbitrary code execution or information disclosure. The vulnerability is classified under CWE-125 (Out-of-bounds Read) and CWE-787 (Out-of-bounds Write), indicating that the software does not properly validate input data boundaries, allowing attackers to read or write memory outside the intended buffer. Exploitation requires the victim to open a maliciously crafted XMT file, which means user interaction is necessary. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity but requiring user interaction and local or network access. The fixed versions are MicroStation 10.17.01.58 and Bentley View 10.17.01.19, indicating that patches have been released but may not yet be widely deployed. No known exploits in the wild have been reported to date, but the potential for code execution makes this a critical issue for organizations using these products. Given the specialized nature of MicroStation in engineering, architecture, and infrastructure design, this vulnerability poses significant risks to organizations relying on these tools for critical design and operational workflows.

Potential Impact

For European organizations, the impact of CVE-2022-42901 can be substantial, especially those in sectors such as civil engineering, construction, infrastructure management, and utilities where Bentley MicroStation is commonly used. Successful exploitation could lead to unauthorized disclosure of sensitive design data, intellectual property theft, or disruption of design processes through arbitrary code execution. This could result in project delays, financial losses, and damage to reputation. Additionally, compromised systems could be leveraged as footholds for further network intrusion, potentially affecting broader IT and OT environments. Given the critical nature of infrastructure projects in Europe and the reliance on precise design software, the vulnerability could also have downstream effects on public safety and regulatory compliance if exploited. The requirement for user interaction (opening a malicious file) somewhat limits the attack vector but does not eliminate risk, especially in environments where file sharing is common. The absence of known exploits suggests a window of opportunity for defenders to patch and mitigate before active attacks emerge.

Mitigation Recommendations

European organizations should prioritize updating Bentley MicroStation to version 10.17.01.58 and Bentley View to 10.17.01.19 or later to remediate this vulnerability. Beyond patching, organizations should implement strict controls on file provenance and scanning of XMT files before opening, including sandboxing or using isolated environments for opening files from untrusted sources. User training should emphasize the risks of opening files from unknown or unverified origins. Network segmentation can limit the impact of a compromised workstation. Additionally, monitoring for anomalous behavior related to MicroStation processes and employing endpoint detection and response (EDR) tools can help detect exploitation attempts. Organizations should also review and restrict permissions to minimize the ability of compromised applications to execute arbitrary code or escalate privileges. Regular vulnerability scanning and asset inventory to identify affected versions will ensure comprehensive coverage. Finally, coordination with software vendors and participation in information sharing groups can provide early warnings of emerging exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-13T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec4aa

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:28:02 PM

Last updated: 8/14/2025, 7:03:15 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats