Vulnerabilites related to Bosch - Video Streaming Gateway
CVE-2020-6769 (GCVE-0-2020-6769)
Vulnerability from cvelistv5
Published
2020-02-07 19:57
Modified
2024-09-16 21:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
Missing Authentication for Critical Function in the Bosch Video Streaming Gateway (VSG) allows an unauthenticated remote attacker to retrieve and set arbitrary configuration data of the Video Streaming Gateway. A successful attack can impact the confidentiality and availability of live and recorded video data of all cameras configured to be controlled by the VSG as well as the recording storage associated with the VSG. This affects Bosch Video Streaming Gateway versions 6.45 <= 6.45.08, 6.44 <= 6.44.022, 6.43 <= 6.43.0023 and 6.42.10 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable VSG version is installed with BVMS. This affects Bosch DIVAR IP 2000 <= 3.62.0019 and DIVAR IP 5000 <= 3.80.0039 if the corresponding port 8023 has been opened in the device's firewall.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | DIVAR IP 2000 |
Version: unspecified < |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:11:04.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "DIVAR IP 2000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "3.62.0019", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "DIVAR IP 5000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "3.80.0039", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Video Streaming Gateway", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "6.45.08", "status": "affected", "version": "6.45", "versionType": "custom" }, { "lessThanOrEqual": "6.44.0030", "status": "affected", "version": "6.44", "versionType": "custom" }, { "lessThanOrEqual": "6.43.0023", "status": "affected", "version": "6.43", "versionType": "custom" }, { "lessThanOrEqual": "6.42.10", "status": "affected", "version": "6.42 and older", "versionType": "custom" } ] }, { "product": "DIVAR IP 3000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "DIVAR IP 7000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "DIVAR IP all-in-one 5000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] } ], "datePublic": "2020-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Missing Authentication for Critical Function in the Bosch Video Streaming Gateway (VSG) allows an unauthenticated remote attacker to retrieve and set arbitrary configuration data of the Video Streaming Gateway. A successful attack can impact the confidentiality and availability of live and recorded video data of all cameras configured to be controlled by the VSG as well as the recording storage associated with the VSG. This affects Bosch Video Streaming Gateway versions 6.45 \u003c= 6.45.08, 6.44 \u003c= 6.44.022, 6.43 \u003c= 6.43.0023 and 6.42.10 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable VSG version is installed with BVMS. This affects Bosch DIVAR IP 2000 \u003c= 3.62.0019 and DIVAR IP 5000 \u003c= 3.80.0039 if the corresponding port 8023 has been opened in the device\u0027s firewall." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-07T19:57:12", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html" } ], "source": { "advisory": "BOSCH-SA-260625-BT", "discovery": "INTERNAL" }, "title": "Missing Authentication for Critical Function in Bosch Video Streaming Gateway", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2020-01-29T13:00:00.000Z", "ID": "CVE-2020-6769", "STATE": "PUBLIC", "TITLE": "Missing Authentication for Critical Function in Bosch Video Streaming Gateway" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "DIVAR IP 2000", "version": { "version_data": [ { "configuration": "port 8023 on device\u0027s firewall opened explicitly and vulnerable VSG version installed", "version_affected": "\u003c=", "version_value": "3.62.0019" } ] } }, { "product_name": "DIVAR IP 5000", "version": { "version_data": [ { "configuration": "port 8023 on device\u0027s firewall opened explicitly and vulnerable VSG version installed", "version_affected": "\u003c=", "version_value": "3.80.0039" } ] } }, { "product_name": "Video Streaming Gateway", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "6.45", "version_value": "6.45.08" }, { "version_affected": "\u003c=", "version_name": "6.44", "version_value": "6.44.0030" }, { "version_affected": "\u003c=", "version_name": "6.43", "version_value": "6.43.0023" }, { "version_affected": "\u003c=", "version_name": "6.42 and older", "version_value": "6.42.10" } ] } }, { "product_name": "DIVAR IP 3000", "version": { "version_data": [ { "configuration": "vulnerable VSG version installed", "version_affected": "=", "version_value": "All" } ] } }, { "product_name": "DIVAR IP 7000", "version": { "version_data": [ { "configuration": "vulnerable VSG version installed", "version_affected": "=", "version_value": "All" } ] } }, { "product_name": "DIVAR IP all-in-one 5000", "version": { "version_data": [ { "configuration": "vulnerable VSG version installed", "version_affected": "=", "version_value": "All" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Missing Authentication for Critical Function in the Bosch Video Streaming Gateway (VSG) allows an unauthenticated remote attacker to retrieve and set arbitrary configuration data of the Video Streaming Gateway. A successful attack can impact the confidentiality and availability of live and recorded video data of all cameras configured to be controlled by the VSG as well as the recording storage associated with the VSG. This affects Bosch Video Streaming Gateway versions 6.45 \u003c= 6.45.08, 6.44 \u003c= 6.44.022, 6.43 \u003c= 6.43.0023 and 6.42.10 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable VSG version is installed with BVMS. This affects Bosch DIVAR IP 2000 \u003c= 3.62.0019 and DIVAR IP 5000 \u003c= 3.80.0039 if the corresponding port 8023 has been opened in the device\u0027s firewall." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306 Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html" } ] }, "source": { "advisory": "BOSCH-SA-260625-BT", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2020-6769", "datePublished": "2020-02-07T19:57:12.914579Z", "dateReserved": "2020-01-10T00:00:00", "dateUpdated": "2024-09-16T21:03:26.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6790 (GCVE-0-2020-6790)
Vulnerability from cvelistv5
Published
2021-03-25 15:53
Modified
2024-09-17 04:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-427 - Uncontrolled Search Path Element
Summary
Calling an executable through an Uncontrolled Search Path Element in the Bosch Video Streaming Gateway installer up to and including version 6.45.10 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious exe in the same directory where the installer is started from.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Bosch | Video Streaming Gateway |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:11:05.015Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Video Streaming Gateway", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "6.45.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Dhiraj Mishra" } ], "datePublic": "2021-03-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Calling an executable through an Uncontrolled Search Path Element in the Bosch Video Streaming Gateway installer up to and including version 6.45.10 potentially allows an attacker to execute arbitrary code on a victim\u0027s system. A prerequisite is that the victim is tricked into placing a malicious exe in the same directory where the installer is started from." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-25T15:53:57", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html" } ], "source": { "advisory": "BOSCH-SA-835563-BT", "discovery": "EXTERNAL" }, "title": "Uncontrolled Search Path Element in Bosch Video Streaming Gateway Installer", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2021-03-24", "ID": "CVE-2020-6790", "STATE": "PUBLIC", "TITLE": "Uncontrolled Search Path Element in Bosch Video Streaming Gateway Installer" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Video Streaming Gateway", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "6.45.10" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "credit": [ { "lang": "eng", "value": "Dhiraj Mishra" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Calling an executable through an Uncontrolled Search Path Element in the Bosch Video Streaming Gateway installer up to and including version 6.45.10 potentially allows an attacker to execute arbitrary code on a victim\u0027s system. A prerequisite is that the victim is tricked into placing a malicious exe in the same directory where the installer is started from." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427 Uncontrolled Search Path Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html" } ] }, "source": { "advisory": "BOSCH-SA-835563-BT", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2020-6790", "datePublished": "2021-03-25T15:53:57.342668Z", "dateReserved": "2020-01-10T00:00:00", "dateUpdated": "2024-09-17T04:25:29.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-32230 (GCVE-0-2023-32230)
Vulnerability from cvelistv5
Published
2023-12-18 12:58
Modified
2024-08-02 15:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-703 - Improper Check or Handling of Exceptional Conditions
Summary
An improper handling of a malformed API request to an API server in Bosch BT software products can allow an unauthenticated attacker to cause a Denial of Service (DoS) situation.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | Video Recording Manager |
Version: 0 < |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:10:24.221Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Video Recording Manager", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "04.10.0079", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "product": "Video Streaming Gateway", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "8.1.2.2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "9.0.0.178", "status": "affected", "version": "9.0.0", "versionType": "custom" } ] }, { "product": "Monitorwall", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "10.00.0164", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "product": "VJD-7513", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "10.40.0055", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "product": "VJD-7523", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "10.40.0055", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper handling of a malformed API request to an API server in Bosch BT software products can allow an unauthenticated attacker to cause a Denial of Service (DoS) situation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703 Improper Check or Handling of Exceptional Conditions", "lang": "en-US" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-18T12:58:08.690Z", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html", "tags": [ "vendor-advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html" } ] } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2023-32230", "datePublished": "2023-12-18T12:58:08.690Z", "dateReserved": "2023-05-04T21:01:16.508Z", "dateUpdated": "2024-08-02T15:10:24.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }