Security Lab

Множественные уязвимости в Bentley View and MicroStation

Дата публикации:08.12.2021
Дата изменения:09.12.2021
Всего просмотров:750
Опасность:
Высокая
Наличие исправления: Да
Количество уязвимостей:40
CVSSv3.1 рейтинг: 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE ID: CVE-2021-34937
CVE-2021-34930
CVE-2021-34931
CVE-2021-34932
CVE-2021-34933
CVE-2021-34934
CVE-2021-34935
CVE-2021-34936
CVE-2021-34938
CVE-2021-34928
CVE-2021-34939
CVE-2021-34940
CVE-2021-34941
CVE-2021-34942
CVE-2021-34943
CVE-2021-34944
CVE-2021-34945
CVE-2021-34946
CVE-2021-34929
CVE-2021-34927
CVE-2021-34876
CVE-2021-34898
CVE-2021-34877
CVE-2021-34878
CVE-2021-34913
CVE-2021-34885
CVE-2021-34888
CVE-2021-34890
CVE-2021-34891
CVE-2021-34892
CVE-2021-34899
CVE-2021-34926
CVE-2021-34909
CVE-2021-34912
CVE-2021-34920
CVE-2021-34921
CVE-2021-34922
CVE-2021-34923
CVE-2021-34924
CVE-2021-34925
Вектор эксплуатации: Удаленная
Воздействие: Обход ограничений безопасности
Компрометация системы
CWE ID: Нет данных
Наличие эксплоита: Нет данных
Уязвимые продукты: MicroStation 7.x
Bentley View
Уязвимые версии: MicroStation версии 10.16.01.56, 10.16.00.80, 10.15.02.11, 10.15.00.75, 10.15.00.74, 10.14.02.01, 10.13.00.41, 10.14.00.109, 10.13.01.01, 10.13.00.48, 10.12.00.43, 10.12.00.42, 10.12.00.40, 10.11.00.39, 10.11.00.42, 10.11.00.36, 10.10.00.28, 10.10.00.32, 10.10.00.23, 10.09.00.24, 10.09.01.02, 10.09.00.26, 10.09.01.01, 10.08.00.41, 10.08.00.39, 10.08.00.37, 10.07.00.39, 10.06.00.38, 10.05.00.43, 10.05.00.40, 10.04.00.49, 10.04.00.46, 10.03.00.30, 10.02.00.39, 10.01.00.13, 10.00.00.25
Bentley View версии 10.16.01.56, 10.16.00.80, 10.15.02.11, 10.15.00.75, 10.15.00.74, 10.14.02.01, 10.13.00.41, 10.14.00.109, 10.13.01.01, 10.13.00.48, 10.12.00.43, 10.12.00.42, 10.12.00.40, 10.11.00.39, 10.11.00.42, 10.11.00.36, 10.10.00.28, 10.10.00.32, 10.10.00.23, 10.09.00.24, 10.09.01.02, 10.09.00.26, 10.09.01.01, 10.08.00.41, 10.08.00.39, 10.08.00.37, 10.07.00.39, 10.06.00.38, 10.05.00.43, 10.05.00.40, 10.04.00.49, 10.04.00.46, 10.03.00.30, 10.02.00.39, 10.01.00.13, 10.00.00.25
Описание:

Множественные уязвимости в Bentley View and MicroStation

URL производителя: https://www.bentley.com/en
Решение: Установите исправление с сайта производителя.
Ссылки: https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
https://www.zerodayinitiative.com/advisories/ZDI-21-1525/
https://www.zerodayinitiative.com/advisories/ZDI-21-1518/
https://www.zerodayinitiative.com/advisories/ZDI-21-1519/
https://www.zerodayinitiative.com/advisories/ZDI-21-1520/
https://www.zerodayinitiative.com/advisories/ZDI-21-1521/
https://www.zerodayinitiative.com/advisories/ZDI-21-1522/
https://www.zerodayinitiative.com/advisories/ZDI-21-1523/
https://www.zerodayinitiative.com/advisories/ZDI-21-1524/
https://www.zerodayinitiative.com/advisories/ZDI-21-1526/
https://www.zerodayinitiative.com/advisories/ZDI-21-1516/
https://www.zerodayinitiative.com/advisories/ZDI-21-1527/
https://www.zerodayinitiative.com/advisories/ZDI-21-1528/
https://www.zerodayinitiative.com/advisories/ZDI-21-1529/
https://www.zerodayinitiative.com/advisories/ZDI-21-1530/
https://www.zerodayinitiative.com/advisories/ZDI-21-1531/
https://www.zerodayinitiative.com/advisories/ZDI-21-1532/
https://www.zerodayinitiative.com/advisories/ZDI-21-1533/
https://www.zerodayinitiative.com/advisories/ZDI-21-1534/
https://www.zerodayinitiative.com/advisories/ZDI-21-1517/
https://www.zerodayinitiative.com/advisories/ZDI-21-1515/
https://www.zerodayinitiative.com/advisories/ZDI-21-1464/
https://www.zerodayinitiative.com/advisories/ZDI-21-1487/
https://www.zerodayinitiative.com/advisories/ZDI-21-1465/
https://www.zerodayinitiative.com/advisories/ZDI-21-1466/
https://www.zerodayinitiative.com/advisories/ZDI-21-1467/
https://www.zerodayinitiative.com/advisories/ZDI-21-1474/
https://www.zerodayinitiative.com/advisories/ZDI-21-1477/
https://www.zerodayinitiative.com/advisories/ZDI-21-1479/
https://www.zerodayinitiative.com/advisories/ZDI-21-1480/
https://www.zerodayinitiative.com/advisories/ZDI-21-1481/
https://www.zerodayinitiative.com/advisories/ZDI-21-1488/
https://www.zerodayinitiative.com/advisories/ZDI-21-1514/
https://www.zerodayinitiative.com/advisories/ZDI-21-1498/
https://www.zerodayinitiative.com/advisories/ZDI-21-1501/
https://www.zerodayinitiative.com/advisories/ZDI-21-1508/
https://www.zerodayinitiative.com/advisories/ZDI-21-1509/
https://www.zerodayinitiative.com/advisories/ZDI-21-1510/
https://www.zerodayinitiative.com/advisories/ZDI-21-1511/
https://www.zerodayinitiative.com/advisories/ZDI-21-1512/
https://www.zerodayinitiative.com/advisories/ZDI-21-1513/