Vulnerabilites related to Bosch - DIVAR IP 7000
CVE-2020-6768 (GCVE-0-2020-6768)
Vulnerability from cvelistv5
Published
2020-02-07 20:01
Modified
2024-09-17 00:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
A path traversal vulnerability in the Bosch Video Management System (BVMS) NoTouch deployment allows an unauthenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | DIVAR IP 3000 |
Version: All |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:11:05.063Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-815013-bt.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "DIVAR IP 3000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "DIVAR IP 7000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "DIVAR IP all-in-one 5000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "Bosch Video Management System", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "7.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "8.0.0.329", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "9.0.0.827", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "10.0.0.1225", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "BVMS Viewer", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "7.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "8.0.0.329", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "9.0.0.827", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "10.0.0.1225", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability in the Bosch Video Management System (BVMS) NoTouch deployment allows an unauthenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-07T20:01:21", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-815013-bt.html" } ], "source": { "advisory": "BOSCH-SA-815013-BT", "discovery": "INTERNAL" }, "title": "Path Traversal in Bosch Video Management System (BVMS)", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2020-01-29T13:00:00.000Z", "ID": "CVE-2020-6768", "STATE": "PUBLIC", "TITLE": "Path Traversal in Bosch Video Management System (BVMS)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "DIVAR IP 3000", "version": { "version_data": [ { "configuration": "vulnerable BVMS version installed", "version_affected": "=", "version_value": "All" } ] } }, { "product_name": "DIVAR IP 7000", "version": { "version_data": [ { "configuration": "vulnerable BVMS version installed", "version_affected": "=", "version_value": "All" } ] } }, { "product_name": "DIVAR IP all-in-one 5000", "version": { "version_data": [ { "configuration": "vulnerable BVMS version installed", "version_affected": "=", "version_value": "All" } ] } }, { "product_name": "Bosch Video Management System", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "7.5" }, { "configuration": "patch for security issue 211404, 241463 not installed", "version_affected": "\u003c=", "version_value": "8.0.0.329" }, { "configuration": "patch for security issue 211404, 241463 not installed", "version_affected": "\u003c=", "version_value": "9.0.0.827" }, { "configuration": "patch for security issue 211404, 241463 not installed", "version_affected": "\u003c=", "version_value": "10.0.0.1225" } ] } }, { "product_name": "BVMS Viewer", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "7.5" }, { "configuration": "patch for security issue 211404, 241463 not installed", "version_affected": "\u003c=", "version_value": "8.0.0.329" }, { "configuration": "patch for security issue 211404, 241463 not installed", "version_affected": "\u003c=", "version_value": "9.0.0.827" }, { "configuration": "patch for security issue 211404, 241463 not installed", "version_affected": "\u003c=", "version_value": "10.0.0.1225" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A path traversal vulnerability in the Bosch Video Management System (BVMS) NoTouch deployment allows an unauthenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/bosch-sa-815013-bt.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/bosch-sa-815013-bt.html" } ] }, "source": { "advisory": "BOSCH-SA-815013-BT", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2020-6768", "datePublished": "2020-02-07T20:01:21.945283Z", "dateReserved": "2020-01-10T00:00:00", "dateUpdated": "2024-09-17T00:16:27.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6767 (GCVE-0-2020-6767)
Vulnerability from cvelistv5
Published
2020-02-06 16:19
Modified
2024-09-16 18:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
A path traversal vulnerability in the Bosch Video Management System (BVMS) FileTransferService allows an authenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | DIVAR IP 3000 |
Version: All |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:11:04.890Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-381489-BT.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "DIVAR IP 3000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "DIVAR IP 7000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "DIVAR IP all-in-one 5000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "Bosch Video Management System", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "7.0 and older" }, { "status": "affected", "version": "7.5 and older" }, { "status": "affected", "version": "8.0 through 8.0.0.329" }, { "status": "affected", "version": "9.0 through 9.0.0.827" }, { "status": "affected", "version": "10.0 through 10.0.0.1225" } ] }, { "product": "BVMS Viewer", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "7.0 and older" }, { "status": "affected", "version": "7.5 and older" }, { "status": "affected", "version": "8.0 through 8.0.0.329" }, { "status": "affected", "version": "9.0 through 9.0.0.827" }, { "status": "affected", "version": "10.0 through 10.0.0.1225" } ] } ], "datePublic": "2020-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability in the Bosch Video Management System (BVMS) FileTransferService allows an authenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-06T16:19:51", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-381489-BT.html" } ], "source": { "advisory": "BOSCH-SA-381489-BT", "discovery": "INTERNAL" }, "title": "Path Traversal in Bosch Video Management System (BVMS)", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2020-01-29T13:00:00.000Z", "ID": "CVE-2020-6767", "STATE": "PUBLIC", "TITLE": "Path Traversal in Bosch Video Management System (BVMS)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "DIVAR IP 3000", "version": { "version_data": [ { "version_value": "All" } ] } }, { "product_name": "DIVAR IP 7000", "version": { "version_data": [ { "version_value": "All" } ] } }, { "product_name": "DIVAR IP all-in-one 5000", "version": { "version_data": [ { "version_value": "All" } ] } }, { "product_name": "Bosch Video Management System", "version": { "version_data": [ { "version_value": "7.0 and older" }, { "version_value": "7.5 and older" }, { "version_value": "8.0 through 8.0.0.329" }, { "version_value": "9.0 through 9.0.0.827" }, { "version_value": "10.0 through 10.0.0.1225" } ] } }, { "product_name": "BVMS Viewer", "version": { "version_data": [ { "version_value": "7.0 and older" }, { "version_value": "7.5 and older" }, { "version_value": "8.0 through 8.0.0.329" }, { "version_value": "9.0 through 9.0.0.827" }, { "version_value": "10.0 through 10.0.0.1225" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A path traversal vulnerability in the Bosch Video Management System (BVMS) FileTransferService allows an authenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-381489-BT.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-381489-BT.html" } ] }, "source": { "advisory": "BOSCH-SA-381489-BT", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2020-6767", "datePublished": "2020-02-06T16:19:52.006333Z", "dateReserved": "2020-01-10T00:00:00", "dateUpdated": "2024-09-16T18:14:14.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6769 (GCVE-0-2020-6769)
Vulnerability from cvelistv5
Published
2020-02-07 19:57
Modified
2024-09-16 21:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
Missing Authentication for Critical Function in the Bosch Video Streaming Gateway (VSG) allows an unauthenticated remote attacker to retrieve and set arbitrary configuration data of the Video Streaming Gateway. A successful attack can impact the confidentiality and availability of live and recorded video data of all cameras configured to be controlled by the VSG as well as the recording storage associated with the VSG. This affects Bosch Video Streaming Gateway versions 6.45 <= 6.45.08, 6.44 <= 6.44.022, 6.43 <= 6.43.0023 and 6.42.10 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable VSG version is installed with BVMS. This affects Bosch DIVAR IP 2000 <= 3.62.0019 and DIVAR IP 5000 <= 3.80.0039 if the corresponding port 8023 has been opened in the device's firewall.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | DIVAR IP 2000 |
Version: unspecified < |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:11:04.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "DIVAR IP 2000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "3.62.0019", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "DIVAR IP 5000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "3.80.0039", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Video Streaming Gateway", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "6.45.08", "status": "affected", "version": "6.45", "versionType": "custom" }, { "lessThanOrEqual": "6.44.0030", "status": "affected", "version": "6.44", "versionType": "custom" }, { "lessThanOrEqual": "6.43.0023", "status": "affected", "version": "6.43", "versionType": "custom" }, { "lessThanOrEqual": "6.42.10", "status": "affected", "version": "6.42 and older", "versionType": "custom" } ] }, { "product": "DIVAR IP 3000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "DIVAR IP 7000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "DIVAR IP all-in-one 5000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] } ], "datePublic": "2020-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Missing Authentication for Critical Function in the Bosch Video Streaming Gateway (VSG) allows an unauthenticated remote attacker to retrieve and set arbitrary configuration data of the Video Streaming Gateway. A successful attack can impact the confidentiality and availability of live and recorded video data of all cameras configured to be controlled by the VSG as well as the recording storage associated with the VSG. This affects Bosch Video Streaming Gateway versions 6.45 \u003c= 6.45.08, 6.44 \u003c= 6.44.022, 6.43 \u003c= 6.43.0023 and 6.42.10 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable VSG version is installed with BVMS. This affects Bosch DIVAR IP 2000 \u003c= 3.62.0019 and DIVAR IP 5000 \u003c= 3.80.0039 if the corresponding port 8023 has been opened in the device\u0027s firewall." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-07T19:57:12", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html" } ], "source": { "advisory": "BOSCH-SA-260625-BT", "discovery": "INTERNAL" }, "title": "Missing Authentication for Critical Function in Bosch Video Streaming Gateway", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2020-01-29T13:00:00.000Z", "ID": "CVE-2020-6769", "STATE": "PUBLIC", "TITLE": "Missing Authentication for Critical Function in Bosch Video Streaming Gateway" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "DIVAR IP 2000", "version": { "version_data": [ { "configuration": "port 8023 on device\u0027s firewall opened explicitly and vulnerable VSG version installed", "version_affected": "\u003c=", "version_value": "3.62.0019" } ] } }, { "product_name": "DIVAR IP 5000", "version": { "version_data": [ { "configuration": "port 8023 on device\u0027s firewall opened explicitly and vulnerable VSG version installed", "version_affected": "\u003c=", "version_value": "3.80.0039" } ] } }, { "product_name": "Video Streaming Gateway", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "6.45", "version_value": "6.45.08" }, { "version_affected": "\u003c=", "version_name": "6.44", "version_value": "6.44.0030" }, { "version_affected": "\u003c=", "version_name": "6.43", "version_value": "6.43.0023" }, { "version_affected": "\u003c=", "version_name": "6.42 and older", "version_value": "6.42.10" } ] } }, { "product_name": "DIVAR IP 3000", "version": { "version_data": [ { "configuration": "vulnerable VSG version installed", "version_affected": "=", "version_value": "All" } ] } }, { "product_name": "DIVAR IP 7000", "version": { "version_data": [ { "configuration": "vulnerable VSG version installed", "version_affected": "=", "version_value": "All" } ] } }, { "product_name": "DIVAR IP all-in-one 5000", "version": { "version_data": [ { "configuration": "vulnerable VSG version installed", "version_affected": "=", "version_value": "All" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Missing Authentication for Critical Function in the Bosch Video Streaming Gateway (VSG) allows an unauthenticated remote attacker to retrieve and set arbitrary configuration data of the Video Streaming Gateway. A successful attack can impact the confidentiality and availability of live and recorded video data of all cameras configured to be controlled by the VSG as well as the recording storage associated with the VSG. This affects Bosch Video Streaming Gateway versions 6.45 \u003c= 6.45.08, 6.44 \u003c= 6.44.022, 6.43 \u003c= 6.43.0023 and 6.42.10 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable VSG version is installed with BVMS. This affects Bosch DIVAR IP 2000 \u003c= 3.62.0019 and DIVAR IP 5000 \u003c= 3.80.0039 if the corresponding port 8023 has been opened in the device\u0027s firewall." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306 Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html" } ] }, "source": { "advisory": "BOSCH-SA-260625-BT", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2020-6769", "datePublished": "2020-02-07T19:57:12.914579Z", "dateReserved": "2020-01-10T00:00:00", "dateUpdated": "2024-09-16T21:03:26.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6770 (GCVE-0-2020-6770)
Vulnerability from cvelistv5
Published
2020-02-07 20:08
Modified
2024-09-17 04:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-502 - Deserialization of Untrusted Data
Summary
Deserialization of Untrusted Data in the BVMS Mobile Video Service (BVMS MVS) allows an unauthenticated remote attacker to execute arbitrary code on the system. This affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000 and DIVAR IP 7000 if a vulnerable BVMS version is installed.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | DIVAR IP 3000 |
Version: All |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:11:04.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-885551-BT.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "DIVAR IP 3000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "DIVAR IP 7000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "BVMS Mobile Video Service", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "8.0.0.329", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "9.0.0.827", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "10.0.0.1225", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "7.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data in the BVMS Mobile Video Service (BVMS MVS) allows an unauthenticated remote attacker to execute arbitrary code on the system. This affects Bosch BVMS versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000 and DIVAR IP 7000 if a vulnerable BVMS version is installed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-07T20:08:31", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-885551-BT.html" } ], "source": { "advisory": "BOSCH-SA-885551-BT", "discovery": "INTERNAL" }, "title": "Deserialization of Untrusted Data in Bosch BVMS Mobile Video Service", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2020-01-29T13:00:00.000Z", "ID": "CVE-2020-6770", "STATE": "PUBLIC", "TITLE": "Deserialization of Untrusted Data in Bosch BVMS Mobile Video Service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "DIVAR IP 3000", "version": { "version_data": [ { "configuration": "vulnerable BVMS MVS version installed", "version_affected": "=", "version_value": "All" } ] } } ] }, "vendor_name": "Bosch" }, { "product": { "product_data": [ { "product_name": "DIVAR IP 7000", "version": { "version_data": [ { "configuration": "vulnerable BVMS MVS version installed", "version_affected": "=", "version_value": "All" } ] } } ] }, "vendor_name": "Bosch" }, { "product": { "product_data": [ { "product_name": "BVMS Mobile Video Service", "version": { "version_data": [ { "configuration": "patch for security issue 243748 not installed", "version_affected": "\u003c=", "version_value": "8.0.0.329" }, { "configuration": "patch for security issue 243748 not installed", "version_affected": "\u003c=", "version_value": "9.0.0.827" }, { "configuration": "patch for security issue 243748 not installed", "version_affected": "\u003c=", "version_value": "10.0.0.1225" }, { "version_affected": "\u003c=", "version_value": "7.5" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Deserialization of Untrusted Data in the BVMS Mobile Video Service (BVMS MVS) allows an unauthenticated remote attacker to execute arbitrary code on the system. This affects Bosch BVMS versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000 and DIVAR IP 7000 if a vulnerable BVMS version is installed." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-502 Deserialization of Untrusted Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-885551-BT.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-885551-BT.html" } ] }, "source": { "advisory": "BOSCH-SA-885551-BT", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2020-6770", "datePublished": "2020-02-07T20:08:31.437569Z", "dateReserved": "2020-01-10T00:00:00", "dateUpdated": "2024-09-17T04:09:12.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }