Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
microstation_connect Vendor: bentley

About This Product

microstation_connect is a software product offered by bentley. As an operating system, this product forms the foundation of countless systems, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 79 known vulnerabilities affecting bentley microstation_connect. This includes 59 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2022 to 2023, indicating a recent active security attention. 15 medium-severity issues and 5 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2021-46562 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46563 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46564 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46565 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46566 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46567 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46568 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46569 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46570 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46571 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46572 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46573 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46574 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46575 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46576 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46577 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46578 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46579 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46580 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46581 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46582 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46583 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46584 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46585 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46586 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46587 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46588 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46589 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46590 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46591 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46592 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46593 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46594 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46595 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46596 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46597 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46598 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46599 2022-02-18 2024-11-21 3.3 4.3 Likely
CVE-2021-46600 2022-02-18 2024-11-21 3.3 4.3 Likely
CVE-2021-46601 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46602 2022-02-18 2024-11-21 3.3 4.3 Likely
CVE-2021-46603 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46604 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46605 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46606 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46607 2022-02-18 2024-11-21 3.3 4.3 Likely
CVE-2021-46608 2022-02-18 2024-11-21 3.3 4.3 Likely
CVE-2021-46609 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46610 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46611 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46612 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46613 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46614 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46615 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46616 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46617 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46618 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46619 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46620 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46621 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46622 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46633 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46634 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46635 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46636 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46637 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46638 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46639 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46644 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46645 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46646 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46647 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46648 2022-02-18 2024-11-21 7.8 6.8 Likely
CVE-2021-46649 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46650 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2021-46651 2022-02-18 2024-11-21 5.5 4.3 Likely
CVE-2022-40201 2023-01-06 2025-02-13 7.8 - -
CVE-2022-41613 2023-01-06 2025-02-13 7.8 - -
CVE-2022-1229 2023-03-28 2024-11-21 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for bentley microstation_connect by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.