Vulnerabilites related to bosch - divar_ip_5000
Vulnerability from fkie_nvd
Published
2019-05-13 21:29
Modified
2024-11-21 04:50
Severity ?
Summary
An Open Redirect vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote attacker to redirect users to an arbitrary URL. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.70.0056 and newer; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; fixed versions: 7.5; 3.70.0056).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bosch | divar_ip_2000_firmware | * | |
bosch | divar_ip_2000 | - | |
bosch | divar_ip_5000_firmware | * | |
bosch | divar_ip_5000 | - | |
bosch | video_management_system | * | |
bosch | video_recording_manager | * | |
bosch | video_recording_manager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "360F7882-2D5C-46ED-A9C6-5A79129C272A", "versionEndExcluding": "3.62.0019", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "114BF1E1-4E81-42C3-A563-7C4A523312A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03229722-C77A-4B16-A90C-E9BA73F4A821", "versionEndExcluding": "3.80.0033", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0DE1C9-D3C0-49BF-9FFD-B765F9AF6691", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F58C643-F4E4-43FD-A202-907B8F1FBF43", "versionEndExcluding": "3.71.0056", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "C885C30F-DAD8-4656-BE37-9D298E34C6E1", "versionEndExcluding": "3.70.0056", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD1FA491-AF37-4C00-A6D6-DFA48DEF426D", "versionEndExcluding": "3.81.0032", "versionStartIncluding": "3.81", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Open Redirect vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote attacker to redirect users to an arbitrary URL. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.70.0056 and newer; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; fixed versions: 7.5; 3.70.0056)." }, { "lang": "es", "value": "Una vulnerabilidad de redirecci\u00f3n abierta en el servidor web afecta a varios productos de hardware y software de Bosch. La vulnerabilidad permite potencialmente que un atacante remoto redirija a los usuarios a una URL arbitraria. Productos de hardware afectados: Bosch DIVAR IP 2000 (versiones vulnerables: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; versiones que corrigen el fallo: 3.62.0019 y posteriores), Bosch DIVAR IP 5000 (versiones vulnerables: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; versiones que corrigen el fallo: 3.80.0033 y posteriores). Productos de software afectados: Video Recording Manager (VRM) (versiones vulnerables: 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; versiones que corrigen el fallo: 3.70.0056 y posteriores; 3.81.0032 y posteriores), Bosch Video Management System (BVMS) (versiones vulnerables: 3.50.00XX; 3.55.00XX; 3.60.00XX; versiones que corrigen el fallo: 7.5; 3.70.0056)." } ], "id": "CVE-2019-8951", "lastModified": "2024-11-21T04:50:43.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-13T21:29:01.653", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0401bt-cve-2019-8951_security_advisory_vrm_open_redirect.pdf" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/Advisory/BOSCH-2019-0401.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0401bt-cve-2019-8951_security_advisory_vrm_open_redirect.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/Advisory/BOSCH-2019-0401.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-13 22:29
Modified
2024-11-21 04:50
Severity ?
Summary
A Path Traversal vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote authorized user to access arbitrary files on the system via the network interface. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; 3.70; 3.71 before 3.71.0032 ; fixed versions: 3.71.0032; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; 3.70.0056; fixed versions: 7.5; 3.71.0032).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bosch | divar_ip_2000_firmware | * | |
bosch | divar_ip_2000 | - | |
bosch | divar_ip_5000_firmware | * | |
bosch | divar_ip_5000 | - | |
bosch | video_management_system | * | |
bosch | video_recording_manager | * | |
bosch | video_recording_manager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "360F7882-2D5C-46ED-A9C6-5A79129C272A", "versionEndExcluding": "3.62.0019", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "114BF1E1-4E81-42C3-A563-7C4A523312A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03229722-C77A-4B16-A90C-E9BA73F4A821", "versionEndExcluding": "3.80.0033", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0DE1C9-D3C0-49BF-9FFD-B765F9AF6691", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "640B6AE6-691F-4C75-BD99-254D078D3080", "versionEndExcluding": "3.71.0032", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "526B56A8-3106-44C1-8C77-B22995A98C86", "versionEndExcluding": "3.71.0032", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD1FA491-AF37-4C00-A6D6-DFA48DEF426D", "versionEndExcluding": "3.81.0032", "versionStartIncluding": "3.81", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Path Traversal vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote authorized user to access arbitrary files on the system via the network interface. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; 3.70; 3.71 before 3.71.0032 ; fixed versions: 3.71.0032; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; 3.70.0056; fixed versions: 7.5; 3.71.0032)." }, { "lang": "es", "value": "Una vulnerabilidad de salto de directorio ubicada en el servidor web afecta a varios productos de hardware y software de Bosch. La vulnerabilidad permite potencialmente a un usuario remoto autorizado acceder a archivos arbitrarios en el sistema a trav\u00e9s de la interfaz de red. Productos de hardware afectados: Bosch DIVAR IP 2000 (versiones vulnerables: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; versiones que contienen la soluci\u00f3n: 3.62.0019 y posteriores), Bosch DIVAR IP 5000 (versiones vulnerables: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; versiones que contienen la soluci\u00f3n: 3.80.0033 y posteriores). Productos de software afectados: Video Recording Manager (VRM) (versiones vulnerables: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; 3.70; 3.71 antes de 3.71.0032 ; versiones que contienen la soluci\u00f3n: 3.71.0032; 3.81.0032 y posteriores), Bosch Video Management System (BVMS) (versiones vulnerables: 3.50.00XX; 3.55.00XX; 3.60.00XX; 3.70.0056; versiones que contienen la soluci\u00f3n: 7.5; 3.71.0032)." } ], "id": "CVE-2019-8952", "lastModified": "2024-11-21T04:50:43.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-13T22:29:01.153", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0402bt-cve-2019-8952_security_advisory_vrm_path_traversal.pdf" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/Advisory/BOSCH-2019-0402.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0402bt-cve-2019-8952_security_advisory_vrm_path_traversal.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/Advisory/BOSCH-2019-0402.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-15 11:15
Modified
2024-11-21 07:54
Severity ?
7.1 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Summary
Improper Authorization in SSH server in Bosch VMS 11.0, 11.1.0, and 11.1.1 allows a remote authenticated user to access resources within the trusted internal network via a port forwarding request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "19576583-FEDD-4D73-AE62-863636F9CC3F", "versionEndIncluding": "11.1.1", "versionStartIncluding": "7.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system_viewer:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE49F10A-B283-4A83-B2D4-FC2EF44C9CC7", "versionEndIncluding": "11.1.1", "versionStartIncluding": "7.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF7AC49B-19B5-474A-B2AD-8801440663B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0DE1C9-D3C0-49BF-9FFD-B765F9AF6691", "vulnerable": false }, { "criteria": "cpe:2.3:h:bosch:divar_ip_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "790EF36F-6C6B-477E-A2B8-369E6D113004", "vulnerable": false }, { "criteria": "cpe:2.3:h:bosch:divar_ip_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "10D23E90-110B-4ADC-8417-CD0149D126D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:bosch:divar_ip_7000_r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C27C0C9-7FC8-4B0C-BBF1-C7833CA9B2DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:bosch:divar_ip_7000_r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C021F78B-FBA2-4C35-8B26-FF0E3D4B9907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "167DFF9C-69C3-4C70-B8A7-992D8D2AAD95", "versionEndIncluding": "8.0", "versionStartIncluding": "7.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7EE760B-9B65-49A3-92E5-93880C58A628", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_6000_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D313D23C-C0A8-4F36-93F5-9CF39EF6463F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "790EF36F-6C6B-477E-A2B8-369E6D113004", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_4000_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "92342086-0830-4ABE-A3CF-91255FB7D0B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF7AC49B-19B5-474A-B2AD-8801440663B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A981D11-E964-412C-A333-96BB930758CC", "versionEndIncluding": "11.1.1", "versionStartIncluding": "9.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0DE1C9-D3C0-49BF-9FFD-B765F9AF6691", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_7000_r2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1622C8F-3DD5-4112-BE15-C8873EDFA67E", "versionEndIncluding": "11.1.1", "versionStartIncluding": "7.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_7000_r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C27C0C9-7FC8-4B0C-BBF1-C7833CA9B2DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_7000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69B16286-EF3B-4A4A-AB48-4149CFE6C862", "versionEndIncluding": "8.0", "versionStartIncluding": "7.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "10D23E90-110B-4ADC-8417-CD0149D126D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_7000_r3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9BCD391-4552-4375-BCE7-0EF1BD81A03E", "versionEndIncluding": "11.1.1", "versionStartIncluding": "10.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_7000_r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C021F78B-FBA2-4C35-8B26-FF0E3D4B9907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Authorization in SSH server in Bosch VMS 11.0, 11.1.0, and 11.1.1 allows a remote authenticated user to access resources within the trusted internal network via a port forwarding request." } ], "id": "CVE-2023-28175", "lastModified": "2024-11-21T07:54:32.270", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.7, "source": "psirt@bosch.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-15T11:15:09.227", "references": [ { "source": "psirt@bosch.com", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html" } ], "sourceIdentifier": "psirt@bosch.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "psirt@bosch.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-07 20:15
Modified
2024-11-21 05:36
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Summary
Missing Authentication for Critical Function in the Bosch Video Streaming Gateway (VSG) allows an unauthenticated remote attacker to retrieve and set arbitrary configuration data of the Video Streaming Gateway. A successful attack can impact the confidentiality and availability of live and recorded video data of all cameras configured to be controlled by the VSG as well as the recording storage associated with the VSG. This affects Bosch Video Streaming Gateway versions 6.45 <= 6.45.08, 6.44 <= 6.44.022, 6.43 <= 6.43.0023 and 6.42.10 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable VSG version is installed with BVMS. This affects Bosch DIVAR IP 2000 <= 3.62.0019 and DIVAR IP 5000 <= 3.80.0039 if the corresponding port 8023 has been opened in the device's firewall.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@bosch.com | https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "6982F24B-1DB5-4331-9418-618A0E7C0AA6", "versionEndIncluding": "6.42.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "D132FF92-04FE-4036-A540-2AF7DFF8A7BF", "versionEndIncluding": "6.43.0023", "versionStartIncluding": "6.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "1651176D-7EBE-4CDA-8C96-0767E4458E47", "versionEndIncluding": "6.44.022", "versionStartIncluding": "6.44", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "A556E28A-8323-4990-AF87-57CAF5C4D858", "versionEndIncluding": "6.45.08", "versionStartIncluding": "6.45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4B9754B-930B-4C1C-A2BA-6BF356AD29E3", "versionEndIncluding": "3.62.0019", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "114BF1E1-4E81-42C3-A563-7C4A523312A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D21A7415-BC5C-438A-8003-B733C9C954E9", "versionEndIncluding": "3.80.0039", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0DE1C9-D3C0-49BF-9FFD-B765F9AF6691", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "6982F24B-1DB5-4331-9418-618A0E7C0AA6", "versionEndIncluding": "6.42.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "D132FF92-04FE-4036-A540-2AF7DFF8A7BF", "versionEndIncluding": "6.43.0023", "versionStartIncluding": "6.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "1651176D-7EBE-4CDA-8C96-0767E4458E47", "versionEndIncluding": "6.44.022", "versionStartIncluding": "6.44", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "A556E28A-8323-4990-AF87-57CAF5C4D858", "versionEndIncluding": "6.45.08", "versionStartIncluding": "6.45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7EE760B-9B65-49A3-92E5-93880C58A628", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "6982F24B-1DB5-4331-9418-618A0E7C0AA6", "versionEndIncluding": "6.42.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "D132FF92-04FE-4036-A540-2AF7DFF8A7BF", "versionEndIncluding": "6.43.0023", "versionStartIncluding": "6.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "1651176D-7EBE-4CDA-8C96-0767E4458E47", "versionEndIncluding": "6.44.022", "versionStartIncluding": "6.44", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "A556E28A-8323-4990-AF87-57CAF5C4D858", "versionEndIncluding": "6.45.08", "versionStartIncluding": "6.45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "10D23E90-110B-4ADC-8417-CD0149D126D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "6982F24B-1DB5-4331-9418-618A0E7C0AA6", "versionEndIncluding": "6.42.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "D132FF92-04FE-4036-A540-2AF7DFF8A7BF", "versionEndIncluding": "6.43.0023", "versionStartIncluding": "6.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "1651176D-7EBE-4CDA-8C96-0767E4458E47", "versionEndIncluding": "6.44.022", "versionStartIncluding": "6.44", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "A556E28A-8323-4990-AF87-57CAF5C4D858", "versionEndIncluding": "6.45.08", "versionStartIncluding": "6.45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_all-in-one_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "7075A014-A297-4E41-81D8-2535BC2BD4E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authentication for Critical Function in the Bosch Video Streaming Gateway (VSG) allows an unauthenticated remote attacker to retrieve and set arbitrary configuration data of the Video Streaming Gateway. A successful attack can impact the confidentiality and availability of live and recorded video data of all cameras configured to be controlled by the VSG as well as the recording storage associated with the VSG. This affects Bosch Video Streaming Gateway versions 6.45 \u003c= 6.45.08, 6.44 \u003c= 6.44.022, 6.43 \u003c= 6.43.0023 and 6.42.10 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable VSG version is installed with BVMS. This affects Bosch DIVAR IP 2000 \u003c= 3.62.0019 and DIVAR IP 5000 \u003c= 3.80.0039 if the corresponding port 8023 has been opened in the device\u0027s firewall." }, { "lang": "es", "value": "Una Falta de Autenticaci\u00f3n para la Funci\u00f3n Cr\u00edtica en Bosch Video Streaming Gateway (VSG) permite a un atacante remoto no autenticado recuperar y establecer datos de configuraci\u00f3n arbitrarios de Video Streaming Gateway. Un ataque con \u00e9xito puede impactar la confidencialidad y la disponibilidad de los datos de video en vivo y grabados de todas las c\u00e1maras configuradas para ser controladas por el VSG, as\u00ed como el almacenamiento de grabaci\u00f3n asociado con el VSG. Esto afecta a Bosch Video Streaming Gateway versiones 6.45 anteriores a 6.45.08 incluy\u00e9ndola, 6.44 anteriores a 6.44.022 incluy\u00e9ndola, 6.43 anteriores a 6.43.0023 incluy\u00e9ndola y 6.42.10 y anteriores. Esto afecta a Bosch DIVAR IP 3000, DIVAR IP 7000 y DIVAR IP all-in-one 5000, si se instala una versi\u00f3n vulnerable de VSG con BVMS. Esto afecta a Bosch DIVAR IP 2000 anteriores a 3.62.0019 incluy\u00e9ndola y DIVAR IP 5000 anteriores a 3.80.0039 incluy\u00e9ndola, si el puerto 8023 correspondiente ha sido abierto en el firewall del dispositivo." } ], "id": "CVE-2020-6769", "lastModified": "2024-11-21T05:36:09.790", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "psirt@bosch.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-07T20:15:35.507", "references": [ { "source": "psirt@bosch.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html" } ], "sourceIdentifier": "psirt@bosch.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "psirt@bosch.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-26 16:15
Modified
2024-11-21 04:21
Severity ?
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 < v3.71.0034 and v3.81 < 3.81.0050; DIVAR IP 5000 3.80 < 3.80.0039; BVMS all versions using VRM.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bosch | video_recording_manager | * | |
bosch | video_recording_manager | * | |
bosch | divar_ip_5000_firmware | * | |
bosch | divar_ip_5000 | - | |
bosch | video_management_system | 3.70.0056 | |
bosch | video_management_system | 3.70.0058 | |
bosch | video_management_system | 3.70.0060 | |
bosch | video_management_system | 3.70.0062 | |
bosch | video_management_system | 3.71.0022 | |
bosch | video_management_system | 3.71.0029 | |
bosch | video_management_system | 3.71.0031 | |
bosch | video_management_system | 3.71.0032 | |
bosch | video_management_system | 3.81.0032 | |
bosch | video_management_system | 3.81.0038 | |
bosch | video_management_system | 3.81.0048 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BF60397-29D1-4764-913F-96F07DE1A403", "versionEndExcluding": "3.71.0034", "versionStartIncluding": "3.70", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3E94AB7-ABC6-4B3C-97A9-78A8495E793A", "versionEndExcluding": "3.81.0050", "versionStartIncluding": "3.81", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D5204C5-A853-408E-A7DA-8312056693F7", "versionEndExcluding": "3.80.0039", "versionStartIncluding": "3.80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0DE1C9-D3C0-49BF-9FFD-B765F9AF6691", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_management_system:3.70.0056:*:*:*:*:*:*:*", "matchCriteriaId": "230D1A5C-D2B1-48E9-A9A1-EDE65491B715", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:3.70.0058:*:*:*:*:*:*:*", "matchCriteriaId": "60BD9A29-1D4C-44AC-8169-DCDABD21424E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:3.70.0060:*:*:*:*:*:*:*", "matchCriteriaId": "2EB8AC9A-7802-4D29-BA8A-FB2E300F3CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:3.70.0062:*:*:*:*:*:*:*", "matchCriteriaId": "0BE9BAD2-B925-4507-805D-0006850CF815", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:3.71.0022:*:*:*:*:*:*:*", "matchCriteriaId": "8B53DABF-8D3C-4470-A981-12363D230938", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:3.71.0029:*:*:*:*:*:*:*", "matchCriteriaId": "68F65CA5-9032-4DF3-8FA5-122B571DC4A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:3.71.0031:*:*:*:*:*:*:*", "matchCriteriaId": "800E0CBC-591B-4EDC-9E3D-633AD3921F5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:3.71.0032:*:*:*:*:*:*:*", "matchCriteriaId": "327610AC-25F3-4017-9F19-EA13CAE9EC1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:3.81.0032:*:*:*:*:*:*:*", "matchCriteriaId": "6AD6ED4A-EAE2-4AD6-AF48-A6383B9F8257", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:3.81.0038:*:*:*:*:*:*:*", "matchCriteriaId": "8514A9F2-D0AC-4AD4-878C-C1E21D2029E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:3.81.0048:*:*:*:*:*:*:*", "matchCriteriaId": "4677B06D-B4A9-4892-B735-71FE614E51FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 \u003c v3.71.0034 and v3.81 \u003c 3.81.0050; DIVAR IP 5000 3.80 \u003c 3.80.0039; BVMS all versions using VRM." }, { "lang": "es", "value": "Un control de acceso inapropiado en el servidor RCP+ del componente Bosch Video Recording Manager (VRM), permite el acceso arbitrario y no autenticado a un subconjunto limitado de certificados, almacenados en el sistema operativo subyacente de Microsoft Windows.\u0026#xa0;Las versiones corregidas implementan comprobaciones de autenticaci\u00f3n modificadas.\u0026#xa0;Las versiones anteriores a 3.70 del software VRM no son consideradas afectadas.\u0026#xa0;Esta vulnerabilidad afecta a VRM versiones v3.70.x, v3.71 anteriores a v3.71.0034 y versiones v3.81 anteriores a 3.81.0050;\u0026#xa0;DIVAR IP 5000 versiones 3.80 anteriores a 3.80.0039;\u0026#xa0;BVMS todas las versiones que usan VRM" } ], "id": "CVE-2019-11684", "lastModified": "2024-11-21T04:21:35.223", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.3, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-26T16:15:12.217", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2019-8951 (GCVE-0-2019-8951)
Vulnerability from cvelistv5
Published
2019-05-13 20:51
Modified
2024-08-04 21:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An Open Redirect vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote attacker to redirect users to an arbitrary URL. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.70.0056 and newer; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; fixed versions: 7.5; 3.70.0056).
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:31:37.595Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0401bt-cve-2019-8951_security_advisory_vrm_open_redirect.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/Advisory/BOSCH-2019-0401.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-04-03T00:00:00", "descriptions": [ { "lang": "en", "value": "An Open Redirect vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote attacker to redirect users to an arbitrary URL. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.70.0056 and newer; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; fixed versions: 7.5; 3.70.0056)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-13T20:51:33", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0401bt-cve-2019-8951_security_advisory_vrm_open_redirect.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/Advisory/BOSCH-2019-0401.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-8951", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Open Redirect vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote attacker to redirect users to an arbitrary URL. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.70.0056 and newer; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; fixed versions: 7.5; 3.70.0056)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com", "refsource": "CONFIRM", "url": "https://psirt.bosch.com" }, { "name": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0401bt-cve-2019-8951_security_advisory_vrm_open_redirect.pdf", "refsource": "CONFIRM", "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0401bt-cve-2019-8951_security_advisory_vrm_open_redirect.pdf" }, { "name": "https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html", "refsource": "CONFIRM", "url": "https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html" }, { "name": "https://psirt.bosch.com/Advisory/BOSCH-2019-0401.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/Advisory/BOSCH-2019-0401.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-8951", "datePublished": "2019-05-13T20:51:33", "dateReserved": "2019-02-20T00:00:00", "dateUpdated": "2024-08-04T21:31:37.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11684 (GCVE-0-2019-11684)
Vulnerability from cvelistv5
Published
2021-02-26 15:05
Modified
2024-09-17 01:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 < v3.71.0034 and v3.81 < 3.81.0050; DIVAR IP 5000 3.80 < 3.80.0039; BVMS all versions using VRM.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:03:32.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 \u003c v3.71.0034 and v3.81 \u003c 3.81.0050; DIVAR IP 5000 3.80 \u003c 3.80.0039; BVMS all versions using VRM." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-26T15:05:45", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html" } ], "source": { "advisory": "BOSCH-SA-804652-BT", "discovery": "INTERNAL" }, "title": "Improper Access Control in Bosch Video Recording Manager", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_PUBLIC": "2019-05-09", "ID": "CVE-2019-11684", "STATE": "PUBLIC", "TITLE": "Improper Access Control in Bosch Video Recording Manager" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 \u003c v3.71.0034 and v3.81 \u003c 3.81.0050; DIVAR IP 5000 3.80 \u003c 3.80.0039; BVMS all versions using VRM." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html" } ] }, "source": { "advisory": "BOSCH-SA-804652-BT", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-11684", "datePublished": "2021-02-26T15:05:45.533535Z", "dateReserved": "2019-05-02T00:00:00", "dateUpdated": "2024-09-17T01:22:05.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-28175 (GCVE-0-2023-28175)
Vulnerability from cvelistv5
Published
2023-06-15 10:14
Modified
2024-12-17 20:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Improper Authorization in SSH server in Bosch VMS 11.0, 11.1.0, and 11.1.1 allows a remote authenticated user to access resources within the trusted internal network via a port forwarding request.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | BVMS |
Version: 7.5 < |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:30:24.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28175", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T20:49:39.796592Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-17T20:51:14.639Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "BVMS", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "11.1.1", "status": "affected", "version": "7.5", "versionType": "custom" } ] }, { "product": "BVMS Viewer", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "11.1.1", "status": "affected", "version": "7.5", "versionType": "custom" } ] }, { "product": "Bosch DIVAR IP 3000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "8.0", "status": "affected", "version": "7.5", "versionType": "custom" } ] }, { "product": "Bosch DIVAR IP 7000 R1", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "8.0", "status": "affected", "version": "7.5", "versionType": "custom" } ] }, { "product": "Bosch DIVAR IP 7000 R2", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "11.1.1", "status": "affected", "version": "7.5", "versionType": "custom" } ] }, { "product": "Bosch DIVAR IP all-in-one 7000 R3", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "11.1.1", "status": "affected", "version": "10.1.1", "versionType": "custom" } ] }, { "product": "Bosch DIVAR IP all-in-one 5000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "11.1.1", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Bosch DIVAR IP all-in-one 7000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "11.1.1", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "DIVAR IP all-in-one 4000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "11.1.1" } ] }, { "product": "DIVAR IP all-in-one 6000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "11.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Authorization in SSH server in Bosch VMS 11.0, 11.1.0, and 11.1.1 allows a remote authenticated user to access resources within the trusted internal network via a port forwarding request." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en-US" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-15T10:14:34.076Z", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html", "tags": [ "vendor-advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html" } ] } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2023-28175", "datePublished": "2023-06-15T10:14:34.076Z", "dateReserved": "2023-03-13T15:46:37.814Z", "dateUpdated": "2024-12-17T20:51:14.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-8952 (GCVE-0-2019-8952)
Vulnerability from cvelistv5
Published
2019-05-13 21:14
Modified
2024-08-04 21:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A Path Traversal vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote authorized user to access arbitrary files on the system via the network interface. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; 3.70; 3.71 before 3.71.0032 ; fixed versions: 3.71.0032; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; 3.70.0056; fixed versions: 7.5; 3.71.0032).
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:31:37.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/Advisory/BOSCH-2019-0402.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0402bt-cve-2019-8952_security_advisory_vrm_path_traversal.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-04-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A Path Traversal vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote authorized user to access arbitrary files on the system via the network interface. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; 3.70; 3.71 before 3.71.0032 ; fixed versions: 3.71.0032; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; 3.70.0056; fixed versions: 7.5; 3.71.0032)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-13T21:14:34", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/Advisory/BOSCH-2019-0402.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0402bt-cve-2019-8952_security_advisory_vrm_path_traversal.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-8952", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Path Traversal vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote authorized user to access arbitrary files on the system via the network interface. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; 3.70; 3.71 before 3.71.0032 ; fixed versions: 3.71.0032; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; 3.70.0056; fixed versions: 7.5; 3.71.0032)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com", "refsource": "CONFIRM", "url": "https://psirt.bosch.com" }, { "name": "https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html", "refsource": "CONFIRM", "url": "https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html" }, { "name": "https://psirt.bosch.com/Advisory/BOSCH-2019-0402.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/Advisory/BOSCH-2019-0402.html" }, { "name": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0402bt-cve-2019-8952_security_advisory_vrm_path_traversal.pdf", "refsource": "CONFIRM", "url": "https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0402bt-cve-2019-8952_security_advisory_vrm_path_traversal.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-8952", "datePublished": "2019-05-13T21:14:34", "dateReserved": "2019-02-20T00:00:00", "dateUpdated": "2024-08-04T21:31:37.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6769 (GCVE-0-2020-6769)
Vulnerability from cvelistv5
Published
2020-02-07 19:57
Modified
2024-09-16 21:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
Missing Authentication for Critical Function in the Bosch Video Streaming Gateway (VSG) allows an unauthenticated remote attacker to retrieve and set arbitrary configuration data of the Video Streaming Gateway. A successful attack can impact the confidentiality and availability of live and recorded video data of all cameras configured to be controlled by the VSG as well as the recording storage associated with the VSG. This affects Bosch Video Streaming Gateway versions 6.45 <= 6.45.08, 6.44 <= 6.44.022, 6.43 <= 6.43.0023 and 6.42.10 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable VSG version is installed with BVMS. This affects Bosch DIVAR IP 2000 <= 3.62.0019 and DIVAR IP 5000 <= 3.80.0039 if the corresponding port 8023 has been opened in the device's firewall.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | DIVAR IP 2000 |
Version: unspecified < |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:11:04.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "DIVAR IP 2000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "3.62.0019", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "DIVAR IP 5000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "3.80.0039", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Video Streaming Gateway", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "6.45.08", "status": "affected", "version": "6.45", "versionType": "custom" }, { "lessThanOrEqual": "6.44.0030", "status": "affected", "version": "6.44", "versionType": "custom" }, { "lessThanOrEqual": "6.43.0023", "status": "affected", "version": "6.43", "versionType": "custom" }, { "lessThanOrEqual": "6.42.10", "status": "affected", "version": "6.42 and older", "versionType": "custom" } ] }, { "product": "DIVAR IP 3000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "DIVAR IP 7000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "DIVAR IP all-in-one 5000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] } ], "datePublic": "2020-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Missing Authentication for Critical Function in the Bosch Video Streaming Gateway (VSG) allows an unauthenticated remote attacker to retrieve and set arbitrary configuration data of the Video Streaming Gateway. A successful attack can impact the confidentiality and availability of live and recorded video data of all cameras configured to be controlled by the VSG as well as the recording storage associated with the VSG. This affects Bosch Video Streaming Gateway versions 6.45 \u003c= 6.45.08, 6.44 \u003c= 6.44.022, 6.43 \u003c= 6.43.0023 and 6.42.10 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable VSG version is installed with BVMS. This affects Bosch DIVAR IP 2000 \u003c= 3.62.0019 and DIVAR IP 5000 \u003c= 3.80.0039 if the corresponding port 8023 has been opened in the device\u0027s firewall." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-07T19:57:12", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html" } ], "source": { "advisory": "BOSCH-SA-260625-BT", "discovery": "INTERNAL" }, "title": "Missing Authentication for Critical Function in Bosch Video Streaming Gateway", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2020-01-29T13:00:00.000Z", "ID": "CVE-2020-6769", "STATE": "PUBLIC", "TITLE": "Missing Authentication for Critical Function in Bosch Video Streaming Gateway" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "DIVAR IP 2000", "version": { "version_data": [ { "configuration": "port 8023 on device\u0027s firewall opened explicitly and vulnerable VSG version installed", "version_affected": "\u003c=", "version_value": "3.62.0019" } ] } }, { "product_name": "DIVAR IP 5000", "version": { "version_data": [ { "configuration": "port 8023 on device\u0027s firewall opened explicitly and vulnerable VSG version installed", "version_affected": "\u003c=", "version_value": "3.80.0039" } ] } }, { "product_name": "Video Streaming Gateway", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "6.45", "version_value": "6.45.08" }, { "version_affected": "\u003c=", "version_name": "6.44", "version_value": "6.44.0030" }, { "version_affected": "\u003c=", "version_name": "6.43", "version_value": "6.43.0023" }, { "version_affected": "\u003c=", "version_name": "6.42 and older", "version_value": "6.42.10" } ] } }, { "product_name": "DIVAR IP 3000", "version": { "version_data": [ { "configuration": "vulnerable VSG version installed", "version_affected": "=", "version_value": "All" } ] } }, { "product_name": "DIVAR IP 7000", "version": { "version_data": [ { "configuration": "vulnerable VSG version installed", "version_affected": "=", "version_value": "All" } ] } }, { "product_name": "DIVAR IP all-in-one 5000", "version": { "version_data": [ { "configuration": "vulnerable VSG version installed", "version_affected": "=", "version_value": "All" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Missing Authentication for Critical Function in the Bosch Video Streaming Gateway (VSG) allows an unauthenticated remote attacker to retrieve and set arbitrary configuration data of the Video Streaming Gateway. A successful attack can impact the confidentiality and availability of live and recorded video data of all cameras configured to be controlled by the VSG as well as the recording storage associated with the VSG. This affects Bosch Video Streaming Gateway versions 6.45 \u003c= 6.45.08, 6.44 \u003c= 6.44.022, 6.43 \u003c= 6.43.0023 and 6.42.10 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable VSG version is installed with BVMS. This affects Bosch DIVAR IP 2000 \u003c= 3.62.0019 and DIVAR IP 5000 \u003c= 3.80.0039 if the corresponding port 8023 has been opened in the device\u0027s firewall." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306 Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html" } ] }, "source": { "advisory": "BOSCH-SA-260625-BT", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2020-6769", "datePublished": "2020-02-07T19:57:12.914579Z", "dateReserved": "2020-01-10T00:00:00", "dateUpdated": "2024-09-16T21:03:26.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }