Vulnerabilites related to bosch - access_professional_edition
CVE-2021-23859 (GCVE-0-2021-23859)
Vulnerability from cvelistv5
Published
2021-12-08 21:17
Modified
2024-09-16 19:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-703 - Improper Check or Handling of Exceptional Conditions
Summary
An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | BVMS |
Version: unspecified < Version: 11.0 < 11.0.0 Version: 10.0 < 10.0.2 Version: 10.1 < 10.1.1 |
|||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:14:09.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BVMS", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "9.0.0", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "11.0.0", "status": "affected", "version": "11.0", "versionType": "custom" }, { "lessThan": "10.0.2", "status": "affected", "version": "10.0", "versionType": "custom" }, { "lessThan": "10.1.1", "status": "affected", "version": "10.1", "versionType": "custom" } ] }, { "product": "DIVAR IP 7000 R2", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "all" } ] }, { "product": "DIVAR IP all-in-one 5000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "all" } ] }, { "product": "DIVAR IP all-in-one 7000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "all" } ] }, { "product": "VRM", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "3.81", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "4.00.0070", "status": "affected", "version": "4.0", "versionType": "custom" }, { "lessThanOrEqual": "3.83.0021", "status": "affected", "version": "3.83", "versionType": "custom" }, { "lessThanOrEqual": "3.82.0057", "status": "affected", "version": "3.82", "versionType": "custom" } ] }, { "product": "VRM Exporter", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "2.10.0008", "status": "affected", "version": "2.1", "versionType": "custom" } ] }, { "product": "APE", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "3.8.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "AEC", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "2.9.1.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "BIS", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "4.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "4.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "4.7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703 Improper Check or Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T21:17:23", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html" } ], "source": { "advisory": "BOSCH-SA-043434-BT", "discovery": "EXTERNAL" }, "title": "Denial of Service and Authentication Bypass Vulnerability in multiple Bosch products", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2021-12-08", "ID": "CVE-2021-23859", "STATE": "PUBLIC", "TITLE": "Denial of Service and Authentication Bypass Vulnerability in multiple Bosch products" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BVMS", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "11.0", "version_value": "11.0.0" }, { "version_affected": "\u003c", "version_name": "10.0", "version_value": "10.0.2" }, { "version_affected": "\u003c", "version_name": "10.1", "version_value": "10.1.1" }, { "version_affected": "\u003c=", "version_value": "9.0.0" } ] } }, { "product_name": "DIVAR IP 7000 R2", "version": { "version_data": [ { "configuration": "using vulnerable BVMS version", "version_affected": "=", "version_value": "all" } ] } }, { "product_name": "DIVAR IP all-in-one 5000", "version": { "version_data": [ { "configuration": "using vulnerable BVMS or VRM version", "version_affected": "=", "version_value": "all" } ] } }, { "product_name": "DIVAR IP all-in-one 7000", "version": { "version_data": [ { "configuration": "using vulnerable BVMS or VRM version", "version_affected": "=", "version_value": "all" } ] } }, { "product_name": "VRM", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "4.0", "version_value": "4.00.0070" }, { "version_affected": "\u003c=", "version_name": "3.83", "version_value": "3.83.0021" }, { "version_affected": "\u003c=", "version_name": "3.82", "version_value": "3.82.0057" }, { "version_affected": "\u003c=", "version_value": "3.81" } ] } }, { "product_name": "VRM Exporter", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "2.1", "version_value": "2.10.0008" } ] } }, { "product_name": "APE", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "3.8.x.x" } ] } }, { "product_name": "AEC", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.9.1.x" } ] } }, { "product_name": "BIS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "4.9" }, { "version_affected": "\u003c=", "version_value": "4.8" }, { "version_affected": "\u003c=", "version_value": "4.7" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859" } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-703 Improper Check or Handling of Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html" } ] }, "source": { "advisory": "BOSCH-SA-043434-BT", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2021-23859", "datePublished": "2021-12-08T21:17:23.528438Z", "dateReserved": "2021-01-12T00:00:00", "dateUpdated": "2024-09-16T19:45:43.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-23843 (GCVE-0-2021-23843)
Vulnerability from cvelistv5
Published
2022-01-19 20:38
Modified
2024-09-16 23:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
The Bosch software tools AccessIPConfig.exe and AmcIpConfig.exe are used to configure certains settings in AMC2 devices. The tool allows putting a password protection on configured devices to restrict access to the configuration of an AMC2. An attacker can circumvent this protection and make unauthorized changes to configuration data on the device. An attacker can exploit this vulnerability to manipulate the device\'s configuration or make it unresponsive in the local network. The attacker needs to have access to the local network, typically even the same subnet.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:14:09.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AMS", "vendor": "Bosch", "versions": [ { "lessThan": "4.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "APE", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "3.8.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "BIS", "vendor": "Bosch", "versions": [ { "lessThan": "4.9.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "AMC2", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "all" } ] } ], "datePublic": "2022-01-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The Bosch software tools AccessIPConfig.exe and AmcIpConfig.exe are used to configure certains settings in AMC2 devices. The tool allows putting a password protection on configured devices to restrict access to the configuration of an AMC2. An attacker can circumvent this protection and make unauthorized changes to configuration data on the device. An attacker can exploit this vulnerability to manipulate the device\\\u0027s configuration or make it unresponsive in the local network. The attacker needs to have access to the local network, typically even the same subnet." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-19T20:38:55", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html" } ], "source": { "advisory": "BOSCH-SA-940448-BT", "discovery": "EXTERNAL" }, "title": "Lack of authentication mechanisms on the device", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2022-01-19", "ID": "CVE-2021-23843", "STATE": "PUBLIC", "TITLE": "Lack of authentication mechanisms on the device" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AMS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.0" } ] } }, { "product_name": "APE", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "3.8.x" } ] } }, { "product_name": "BIS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.9.1" } ] } }, { "product_name": "AMC2", "version": { "version_data": [ { "version_affected": "=", "version_value": "all" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Bosch software tools AccessIPConfig.exe and AmcIpConfig.exe are used to configure certains settings in AMC2 devices. The tool allows putting a password protection on configured devices to restrict access to the configuration of an AMC2. An attacker can circumvent this protection and make unauthorized changes to configuration data on the device. An attacker can exploit this vulnerability to manipulate the device\\\u0027s configuration or make it unresponsive in the local network. The attacker needs to have access to the local network, typically even the same subnet." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306 Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html" } ] }, "source": { "advisory": "BOSCH-SA-940448-BT", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2021-23843", "datePublished": "2022-01-19T20:38:55.465356Z", "dateReserved": "2021-01-12T00:00:00", "dateUpdated": "2024-09-16T23:01:30.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-23842 (GCVE-0-2021-23842)
Vulnerability from cvelistv5
Published
2022-01-19 20:38
Modified
2024-09-16 21:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-321 - Use of Hard-coded Cryptographic Key
Summary
Communication to the AMC2 uses a state-of-the-art cryptographic algorithm for symmetric encryption called Blowfish. An attacker could retrieve the key from the firmware to decrypt network traffic between the AMC2 and the host system. Thus, an attacker can exploit this vulnerability to decrypt and modify network traffic, decrypt and further investigate the device\'s firmware file, and change the device configuration. The attacker needs to have access to the local network, typically even the same subnet.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:14:09.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AMS", "vendor": "Bosch", "versions": [ { "lessThan": "4.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "APE", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "3.8.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "BIS", "vendor": "Bosch", "versions": [ { "lessThan": "4.9.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "AMC2", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "all" } ] } ], "datePublic": "2022-01-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Communication to the AMC2 uses a state-of-the-art cryptographic algorithm for symmetric encryption called Blowfish. An attacker could retrieve the key from the firmware to decrypt network traffic between the AMC2 and the host system. Thus, an attacker can exploit this vulnerability to decrypt and modify network traffic, decrypt and further investigate the device\\\u0027s firmware file, and change the device configuration. The attacker needs to have access to the local network, typically even the same subnet." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-321", "description": "CWE-321 Use of Hard-coded Cryptographic Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-19T20:38:54", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html" } ], "source": { "advisory": "BOSCH-SA-940448-BT", "discovery": "EXTERNAL" }, "title": "Use of Hard-coded Cryptographic Key", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2022-01-19", "ID": "CVE-2021-23842", "STATE": "PUBLIC", "TITLE": "Use of Hard-coded Cryptographic Key" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AMS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.0" } ] } }, { "product_name": "APE", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "3.8.x" } ] } }, { "product_name": "BIS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.9.1" } ] } }, { "product_name": "AMC2", "version": { "version_data": [ { "version_affected": "=", "version_value": "all" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Communication to the AMC2 uses a state-of-the-art cryptographic algorithm for symmetric encryption called Blowfish. An attacker could retrieve the key from the firmware to decrypt network traffic between the AMC2 and the host system. Thus, an attacker can exploit this vulnerability to decrypt and modify network traffic, decrypt and further investigate the device\\\u0027s firmware file, and change the device configuration. The attacker needs to have access to the local network, typically even the same subnet." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-321 Use of Hard-coded Cryptographic Key" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html" } ] }, "source": { "advisory": "BOSCH-SA-940448-BT", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2021-23842", "datePublished": "2022-01-19T20:38:54.368368Z", "dateReserved": "2021-01-12T00:00:00", "dateUpdated": "2024-09-16T21:56:51.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6958 (GCVE-0-2019-6958)
Vulnerability from cvelistv5
Published
2019-05-29 18:47
Modified
2024-09-17 00:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The RCP+ network port allows access without authentication. Adding authentication feature to the respective library fixes the issue. The issue is classified as "CWE-284: Improper Access Control." This vulnerability, for example, allows a potential attacker to delete video or read video data.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:31:04.392Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0404bt-cve-2019-6958_security_advisory_improper_access_control.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-03-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The RCP+ network port allows access without authentication. Adding authentication feature to the respective library fixes the issue. The issue is classified as \"CWE-284: Improper Access Control.\" This vulnerability, for example, allows a potential attacker to delete video or read video data." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-29T18:47:37", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0404bt-cve-2019-6958_security_advisory_improper_access_control.pdf" } ], "solutions": [ { "lang": "en", "value": "The recommended approach is to update the software to a fixed version as soon as possible. Until a fixed software version is installed, the mitigation approaches firewalling, and IP filtering can be utilized. \n\nFor further informatation please check the published security advisory." } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper Access Control for Bosch Video Systems, PSIM and Access Control Systems", "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_PUBLIC": "2019-03-04T23:00:00.000Z", "ID": "CVE-2019-6958", "STATE": "PUBLIC", "TITLE": "Improper Access Control for Bosch Video Systems, PSIM and Access Control Systems" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The RCP+ network port allows access without authentication. Adding authentication feature to the respective library fixes the issue. The issue is classified as \"CWE-284: Improper Access Control.\" This vulnerability, for example, allows a potential attacker to delete video or read video data." } ] }, "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0404bt-cve-2019-6958_security_advisory_improper_access_control.pdf", "refsource": "CONFIRM", "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0404bt-cve-2019-6958_security_advisory_improper_access_control.pdf" } ] }, "solution": [ { "lang": "en", "value": "The recommended approach is to update the software to a fixed version as soon as possible. Until a fixed software version is installed, the mitigation approaches firewalling, and IP filtering can be utilized. \n\nFor further informatation please check the published security advisory." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-6958", "datePublished": "2019-05-29T18:47:37.354175Z", "dateReserved": "2019-01-25T00:00:00", "dateUpdated": "2024-09-17T00:46:00.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6957 (GCVE-0-2019-6957)
Vulnerability from cvelistv5
Published
2019-05-29 18:55
Modified
2024-09-16 16:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Video Recording Manager (VRM), Video Streaming Gateway (VSG), Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The vulnerability potentially allows the unauthorized execution of code in the system via the network interface.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:31:04.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0403bt-cve-2019-6957_security_advisory_software_buffer_overflow.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Video Recording Manager (VRM), Video Streaming Gateway (VSG), Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The vulnerability potentially allows the unauthorized execution of code in the system via the network interface." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-29T18:55:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0403bt-cve-2019-6957_security_advisory_software_buffer_overflow.pdf" } ], "solutions": [ { "lang": "en", "value": "In cases where a software update is not possible, a reduction in the system\u2019s network exposure is advised. Internet-accessible installations should be firewalled, whilst additional steps like network isolation by VLAN, IP filtering features of the devices and other technologies should be used to decrease the exposure of vulnerable systems. In addition the firewall on the hosts shall be activated and set according to BVMS and BIS configuration manual. \n\nFor further informatation please check the published security advisory." } ], "source": { "discovery": "UNKNOWN" }, "title": "Buffer Overflow for Bosch Video Systems, PSIM and Access Control Systems", "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_PUBLIC": "2019-04-04T22:00:00.000Z", "ID": "CVE-2019-6957", "STATE": "PUBLIC", "TITLE": "Buffer Overflow for Bosch Video Systems, PSIM and Access Control Systems" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Video Recording Manager (VRM), Video Streaming Gateway (VSG), Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The vulnerability potentially allows the unauthorized execution of code in the system via the network interface." } ] }, "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0403bt-cve-2019-6957_security_advisory_software_buffer_overflow.pdf", "refsource": "CONFIRM", "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0403bt-cve-2019-6957_security_advisory_software_buffer_overflow.pdf" } ] }, "solution": [ { "lang": "en", "value": "In cases where a software update is not possible, a reduction in the system\u2019s network exposure is advised. Internet-accessible installations should be firewalled, whilst additional steps like network isolation by VLAN, IP filtering features of the devices and other technologies should be used to decrease the exposure of vulnerable systems. In addition the firewall on the hosts shall be activated and set according to BVMS and BIS configuration manual. \n\nFor further informatation please check the published security advisory." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-6957", "datePublished": "2019-05-29T18:55:20.387906Z", "dateReserved": "2019-01-25T00:00:00", "dateUpdated": "2024-09-16T16:38:39.411Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-12-08 22:15
Modified
2024-11-21 05:51
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B9DD276-15C0-4942-8899-553F7C190320", "versionEndIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "989D5F9A-D223-4070-82AE-FA79E8B2572C", "versionEndExcluding": "10.0.2", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:bosch_video_management_system:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "57FA3EF2-6A7C-46FD-A758-92045A3A2DEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:bosch_video_management_system:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "1FF22168-E2A2-47B8-B9BC-104FF1CFDF30", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54B21E5-8C3E-423F-8E49-9F05B41D540B", "versionEndIncluding": "3.81", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "31D1E38A-C0F8-421B-B837-3D2FBD132A18", "versionEndIncluding": "3.82.0057", "versionStartIncluding": "3.82", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "7171D63A-3A1A-4235-9317-009D7C85A93C", "versionEndIncluding": "3.83.0021", "versionStartIncluding": "3.83", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "31572EBA-C58A-46E8-88EA-ADE04578E039", "versionEndIncluding": "4.00.0070", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_5000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2C1615D-2E5F-4D49-B937-05C81AB5414C", "vulnerable": false }, { "criteria": "cpe:2.3:o:bosch:divar_ip_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCD42BE-E4B7-43FC-95FB-C97704E5C268", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:access_easy_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD36E262-9272-4A72-B883-CBD84123BEDB", "versionEndIncluding": "2.9.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:access_easy_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "50324AEF-BF89-4AAC-B467-FCF87796AB01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:access_professional_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "28B735B8-BBBB-43BD-A06C-3297E44DA485", "versionEndIncluding": "3.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:building_integration_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "B01DD4E9-DD97-4B14-8F9E-5EB953939097", "versionEndIncluding": "4.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_recording_manager_exporter:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7DD7CA3-05D7-4AF1-AD9B-117CC3FF22B5", "versionEndIncluding": "2.10.0008", "versionStartIncluding": "2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859" }, { "lang": "es", "value": "Un atacante no autenticado es capaz de enviar una petici\u00f3n HTTP especial, que causa el bloqueo de un servicio. En el caso de un VRM independiente o de un BVMS con instalaci\u00f3n de VRM, este bloqueo tambi\u00e9n abre la posibilidad de enviar m\u00e1s comandos no autenticados al servicio. En algunos productos, la interfaz s\u00f3lo es accesible localmente, reduciendo la puntuaci\u00f3n base CVSS. Para ver una lista de las puntuaciones CVSS modificadas, consulte el cap\u00edtulo del ap\u00e9ndice oficial de Bosch Advisory Puntuaciones CVSS modificadas para CVE-2021-23859" } ], "id": "CVE-2021-23859", "lastModified": "2024-11-21T05:51:58.003", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "psirt@bosch.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-08T22:15:08.413", "references": [ { "source": "psirt@bosch.com", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html" } ], "sourceIdentifier": "psirt@bosch.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-703" } ], "source": "psirt@bosch.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-19 21:15
Modified
2024-11-21 05:51
Severity ?
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The Bosch software tools AccessIPConfig.exe and AmcIpConfig.exe are used to configure certains settings in AMC2 devices. The tool allows putting a password protection on configured devices to restrict access to the configuration of an AMC2. An attacker can circumvent this protection and make unauthorized changes to configuration data on the device. An attacker can exploit this vulnerability to manipulate the device\'s configuration or make it unresponsive in the local network. The attacker needs to have access to the local network, typically even the same subnet.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@bosch.com | https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bosch | amc2_firmware | - | |
bosch | amc2 | - | |
bosch | access_management_system | 3.0 | |
bosch | access_professional_edition | * | |
bosch | building_integration_system | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:amc2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3032BCA-136A-470F-BD1D-A05FC5D22782", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:amc2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B51541D3-C8B6-4C5E-AC77-70A3F3D7D315", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:access_management_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C98BA3F6-853A-42EA-B7B9-7163AE2A7E74", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:access_professional_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "28B735B8-BBBB-43BD-A06C-3297E44DA485", "versionEndIncluding": "3.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:building_integration_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "95FDA5B3-E4CB-4285-B3E3-C54F3394E9B2", "versionEndExcluding": "4.9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Bosch software tools AccessIPConfig.exe and AmcIpConfig.exe are used to configure certains settings in AMC2 devices. The tool allows putting a password protection on configured devices to restrict access to the configuration of an AMC2. An attacker can circumvent this protection and make unauthorized changes to configuration data on the device. An attacker can exploit this vulnerability to manipulate the device\\\u0027s configuration or make it unresponsive in the local network. The attacker needs to have access to the local network, typically even the same subnet." }, { "lang": "es", "value": "Las herramientas de software de Bosch AccessIPConfig.exe y AmcIpConfig.exe son usadas para configurar determinados ajustes en los dispositivos AMC2. La herramienta permite poner una contrase\u00f1a de protecci\u00f3n en los dispositivos configurados para restringir el acceso a la configuraci\u00f3n de un AMC2. Un atacante puede burlar esta protecci\u00f3n y realizar cambios no autorizados en los datos de configuraci\u00f3n del dispositivo. Un atacante puede explotar esta vulnerabilidad para manipular la configuraci\u00f3n del dispositivo o hacer que no responda en la red local. El atacante necesita tener acceso a la red local, normalmente incluso a la misma subred" } ], "id": "CVE-2021-23843", "lastModified": "2024-11-21T05:51:55.817", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "psirt@bosch.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-19T21:15:08.190", "references": [ { "source": "psirt@bosch.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html" } ], "sourceIdentifier": "psirt@bosch.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "psirt@bosch.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-29 19:29
Modified
2024-11-21 04:47
Severity ?
Summary
A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The RCP+ network port allows access without authentication. Adding authentication feature to the respective library fixes the issue. The issue is classified as "CWE-284: Improper Access Control." This vulnerability, for example, allows a potential attacker to delete video or read video data.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bosch | access_professional_edition | * | |
bosch | bosch_video_client | * | |
bosch | bosch_video_management_system | * | |
bosch | building_integration_system | * | |
bosch | building_integration_system | 4.5 | |
bosch | building_integration_system | 4.6 | |
bosch | building_integration_system | 4.6.1 | |
bosch | configuration_manager | * | |
bosch | video_sdk | * | |
bosch | dip_2000_firmware | * | |
bosch | dip_2000 | - | |
bosch | dip_3000_firmware | - | |
bosch | dip_3000 | - | |
bosch | dip_5000_firmware | * | |
bosch | dip_5000 | - | |
bosch | dip_7000_firmware | - | |
bosch | dip_7000 | gen1 | |
bosch | dip_7000 | gen2 | |
bosch | access_easy_controller_firmware | 2.1.8.5 | |
bosch | access_easy_controller_firmware | 2.1.9.0 | |
bosch | access_easy_controller_firmware | 2.1.9.1 | |
bosch | access_easy_controller_firmware | 2.1.9.3 | |
bosch | access_easy_controller | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:access_professional_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B5A626A-B735-4E0B-8BAC-0A26A02D6599", "versionEndIncluding": "3.7", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:bosch_video_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFBF448F-005B-48FF-B796-DBC8EAA35323", "versionEndExcluding": "1.7.6.079", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B9DD276-15C0-4942-8899-553F7C190320", "versionEndIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:building_integration_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "D92BA2E1-8554-4F13-938D-855BC33A59C9", "versionEndIncluding": "4.4", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:building_integration_system:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "8585CAE6-8A82-4338-A510-BB1798AC0BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:building_integration_system:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "05B6AD6C-8FCC-473C-9D9A-91EA6C9A8E3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:building_integration_system:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E219B63-2423-4D01-BDA9-8128B5E0DC24", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:configuration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "4100A710-A356-4D54-BADE-F6C16947C3F0", "versionEndExcluding": "6.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F421BFB6-5448-4B86-AEB6-062682F56C10", "versionEndExcluding": "6.32.0099", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:dip_2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC039957-2F53-4080-AB7B-1E2AA4F81790", "versionEndExcluding": "0380.037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:dip_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC890021-B200-4743-AB51-03BDC9CB1351", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:dip_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAE1D3ED-FE23-4F3B-AE75-2FFBDEF5FDAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:dip_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB194FD-9D50-4420-925F-48E4B2D0C2E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:dip_5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0062D5B-DF47-47AB-A6E7-B00BEA2FBA1E", "versionEndExcluding": "038.037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:dip_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EFAEE79-2B7C-4F74-B663-F49F2606AF41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:dip_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7731276E-38B9-4B01-B4A3-092A49150B9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:dip_7000:gen1:*:*:*:*:*:*:*", "matchCriteriaId": "C8FDECC6-46D7-4EAF-9CBC-06D2F18AADA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:bosch:dip_7000:gen2:*:*:*:*:*:*:*", "matchCriteriaId": "ED2FF548-939C-4F10-A3E7-02DF342A35B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA449D4D-8AF0-4792-A9CA-8195A4E0082B", "vulnerable": true }, { "criteria": "cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE6EFC6A-351D-4571-A1F7-1E6AC0B77B22", "vulnerable": true }, { "criteria": "cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "A6B97D59-8692-449F-BA59-C2C2F3E0FDDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3C2E4AA-B871-4B0B-8BD0-8D5440BE8144", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:access_easy_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "50324AEF-BF89-4AAC-B467-FCF87796AB01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The RCP+ network port allows access without authentication. Adding authentication feature to the respective library fixes the issue. The issue is classified as \"CWE-284: Improper Access Control.\" This vulnerability, for example, allows a potential attacker to delete video or read video data." }, { "lang": "es", "value": "Una vulnerabilidad de seguridad encontrada recientemente impacta a todas las versiones 9.0 y siguientes de Bosch Video Management System (BVMS), DIVAR IP 2000, 3000, 5000 y 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). El puerto de red RCP+ permite acceso sin autenticaci\u00f3n. La adici\u00f3n de la funci\u00f3n authentication a la biblioteca correspondiente soluciona el problema. El problema es clasificado como \"CWE-284: Improper Access Control\". Esta vulnerabilidad, por ejemplo, permite a un potencial atacante eliminar un v\u00eddeo o leer datos de un v\u00eddeo." } ], "id": "CVE-2019-6958", "lastModified": "2024-11-21T04:47:18.280", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-29T19:29:00.703", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0404bt-cve-2019-6958_security_advisory_improper_access_control.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0404bt-cve-2019-6958_security_advisory_improper_access_control.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-29 19:29
Modified
2024-11-21 04:47
Severity ?
Summary
A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Video Recording Manager (VRM), Video Streaming Gateway (VSG), Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The vulnerability potentially allows the unauthorized execution of code in the system via the network interface.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:access_professional_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B5A626A-B735-4E0B-8BAC-0A26A02D6599", "versionEndIncluding": "3.7", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:bosch_video_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFBF448F-005B-48FF-B796-DBC8EAA35323", "versionEndExcluding": "1.7.6.079", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B9DD276-15C0-4942-8899-553F7C190320", "versionEndIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:building_integration_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "D92BA2E1-8554-4F13-938D-855BC33A59C9", "versionEndIncluding": "4.4", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:building_integration_system:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "8585CAE6-8A82-4338-A510-BB1798AC0BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:building_integration_system:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "05B6AD6C-8FCC-473C-9D9A-91EA6C9A8E3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:building_integration_system:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E219B63-2423-4D01-BDA9-8128B5E0DC24", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:configuration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "4100A710-A356-4D54-BADE-F6C16947C3F0", "versionEndExcluding": "6.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "526B56A8-3106-44C1-8C77-B22995A98C86", "versionEndExcluding": "3.71.0032", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "31523A17-95B3-42D6-B176-1814A91239C9", "versionEndExcluding": "3.81.0048", "versionStartIncluding": "3.81", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F421BFB6-5448-4B86-AEB6-062682F56C10", "versionEndExcluding": "6.32.0099", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAA61FF3-D717-4A33-B175-E418B11A0BEE", "versionEndExcluding": "6.43.0023", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD3166A-2B9C-4641-803C-BC4EBEF035F1", "versionEndExcluding": "6.45.0008", "versionStartIncluding": "6.45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:dip_2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC039957-2F53-4080-AB7B-1E2AA4F81790", "versionEndExcluding": "0380.037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:dip_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC890021-B200-4743-AB51-03BDC9CB1351", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:dip_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAE1D3ED-FE23-4F3B-AE75-2FFBDEF5FDAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:dip_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB194FD-9D50-4420-925F-48E4B2D0C2E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:dip_5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0062D5B-DF47-47AB-A6E7-B00BEA2FBA1E", "versionEndExcluding": "038.037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:dip_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EFAEE79-2B7C-4F74-B663-F49F2606AF41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:dip_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7731276E-38B9-4B01-B4A3-092A49150B9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:dip_7000:gen1:*:*:*:*:*:*:*", "matchCriteriaId": "C8FDECC6-46D7-4EAF-9CBC-06D2F18AADA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:bosch:dip_7000:gen2:*:*:*:*:*:*:*", "matchCriteriaId": "ED2FF548-939C-4F10-A3E7-02DF342A35B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA449D4D-8AF0-4792-A9CA-8195A4E0082B", "vulnerable": true }, { "criteria": "cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE6EFC6A-351D-4571-A1F7-1E6AC0B77B22", "vulnerable": true }, { "criteria": "cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "A6B97D59-8692-449F-BA59-C2C2F3E0FDDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3C2E4AA-B871-4B0B-8BD0-8D5440BE8144", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:access_easy_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "50324AEF-BF89-4AAC-B467-FCF87796AB01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Video Recording Manager (VRM), Video Streaming Gateway (VSG), Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The vulnerability potentially allows the unauthorized execution of code in the system via the network interface." }, { "lang": "es", "value": "Una vulnerabilidad de seguridad encontrada recientemente impacta a todas las versiones 9.0 y anteriores de Bosch Video Management System (BVMS), DIVAR IP 2000, 3000, 5000 and 7000, Video Recording Manager (VRM), Video Streaming Gateway (VSG), Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). La vulnerabilidad potencialmente permite la ejecuci\u00f3n no autorizada de c\u00f3digo en el sistema por medio de la interfaz de red." } ], "id": "CVE-2019-6957", "lastModified": "2024-11-21T04:47:18.127", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-29T19:29:00.657", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0403bt-cve-2019-6957_security_advisory_software_buffer_overflow.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0403bt-cve-2019-6957_security_advisory_software_buffer_overflow.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-19 21:15
Modified
2024-11-21 05:51
Severity ?
5.7 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Summary
Communication to the AMC2 uses a state-of-the-art cryptographic algorithm for symmetric encryption called Blowfish. An attacker could retrieve the key from the firmware to decrypt network traffic between the AMC2 and the host system. Thus, an attacker can exploit this vulnerability to decrypt and modify network traffic, decrypt and further investigate the device\'s firmware file, and change the device configuration. The attacker needs to have access to the local network, typically even the same subnet.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@bosch.com | https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bosch | amc2_firmware | - | |
bosch | amc2 | - | |
bosch | access_management_system | 3.0 | |
bosch | access_professional_edition | * | |
bosch | building_integration_system | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:amc2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3032BCA-136A-470F-BD1D-A05FC5D22782", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:amc2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B51541D3-C8B6-4C5E-AC77-70A3F3D7D315", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:access_management_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C98BA3F6-853A-42EA-B7B9-7163AE2A7E74", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:access_professional_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "28B735B8-BBBB-43BD-A06C-3297E44DA485", "versionEndIncluding": "3.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:building_integration_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "95FDA5B3-E4CB-4285-B3E3-C54F3394E9B2", "versionEndExcluding": "4.9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Communication to the AMC2 uses a state-of-the-art cryptographic algorithm for symmetric encryption called Blowfish. An attacker could retrieve the key from the firmware to decrypt network traffic between the AMC2 and the host system. Thus, an attacker can exploit this vulnerability to decrypt and modify network traffic, decrypt and further investigate the device\\\u0027s firmware file, and change the device configuration. The attacker needs to have access to the local network, typically even the same subnet." }, { "lang": "es", "value": "La comunicaci\u00f3n con el AMC2 usa un algoritmo criptogr\u00e1fico de \u00faltima generaci\u00f3n para el cifrado sim\u00e9trico llamado Blowfish. Un atacante podr\u00eda recuperar la clave del firmware para descifrar el tr\u00e1fico de red entre el AMC2 y el sistema anfitri\u00f3n. As\u00ed, un atacante puede explotar esta vulnerabilidad para descifrar y modificar el tr\u00e1fico de red, descifrar e investigar el archivo de firmware del dispositivo y cambiar la configuraci\u00f3n del mismo. El atacante necesita tener acceso a la red local, normalmente incluso a la misma subred" } ], "id": "CVE-2021-23842", "lastModified": "2024-11-21T05:51:55.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.6, "source": "psirt@bosch.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-19T21:15:08.137", "references": [ { "source": "psirt@bosch.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html" } ], "sourceIdentifier": "psirt@bosch.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-321" } ], "source": "psirt@bosch.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }