Vulnerabilites related to bosch - divar_ip_7000_r3_firmware
CVE-2023-28175 (GCVE-0-2023-28175)
Vulnerability from cvelistv5
Published
2023-06-15 10:14
Modified
2024-12-17 20:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Improper Authorization in SSH server in Bosch VMS 11.0, 11.1.0, and 11.1.1 allows a remote authenticated user to access resources within the trusted internal network via a port forwarding request.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | BVMS |
Version: 7.5 < |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:30:24.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28175", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T20:49:39.796592Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-17T20:51:14.639Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "BVMS", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "11.1.1", "status": "affected", "version": "7.5", "versionType": "custom" } ] }, { "product": "BVMS Viewer", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "11.1.1", "status": "affected", "version": "7.5", "versionType": "custom" } ] }, { "product": "Bosch DIVAR IP 3000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "8.0", "status": "affected", "version": "7.5", "versionType": "custom" } ] }, { "product": "Bosch DIVAR IP 7000 R1", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "8.0", "status": "affected", "version": "7.5", "versionType": "custom" } ] }, { "product": "Bosch DIVAR IP 7000 R2", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "11.1.1", "status": "affected", "version": "7.5", "versionType": "custom" } ] }, { "product": "Bosch DIVAR IP all-in-one 7000 R3", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "11.1.1", "status": "affected", "version": "10.1.1", "versionType": "custom" } ] }, { "product": "Bosch DIVAR IP all-in-one 5000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "11.1.1", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Bosch DIVAR IP all-in-one 7000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "11.1.1", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "DIVAR IP all-in-one 4000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "11.1.1" } ] }, { "product": "DIVAR IP all-in-one 6000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "11.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Authorization in SSH server in Bosch VMS 11.0, 11.1.0, and 11.1.1 allows a remote authenticated user to access resources within the trusted internal network via a port forwarding request." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en-US" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-15T10:14:34.076Z", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html", "tags": [ "vendor-advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html" } ] } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2023-28175", "datePublished": "2023-06-15T10:14:34.076Z", "dateReserved": "2023-03-13T15:46:37.814Z", "dateUpdated": "2024-12-17T20:51:14.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-06-15 11:15
Modified
2024-11-21 07:54
Severity ?
7.1 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Summary
Improper Authorization in SSH server in Bosch VMS 11.0, 11.1.0, and 11.1.1 allows a remote authenticated user to access resources within the trusted internal network via a port forwarding request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "19576583-FEDD-4D73-AE62-863636F9CC3F", "versionEndIncluding": "11.1.1", "versionStartIncluding": "7.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system_viewer:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE49F10A-B283-4A83-B2D4-FC2EF44C9CC7", "versionEndIncluding": "11.1.1", "versionStartIncluding": "7.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF7AC49B-19B5-474A-B2AD-8801440663B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0DE1C9-D3C0-49BF-9FFD-B765F9AF6691", "vulnerable": false }, { "criteria": "cpe:2.3:h:bosch:divar_ip_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "790EF36F-6C6B-477E-A2B8-369E6D113004", "vulnerable": false }, { "criteria": "cpe:2.3:h:bosch:divar_ip_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "10D23E90-110B-4ADC-8417-CD0149D126D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:bosch:divar_ip_7000_r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C27C0C9-7FC8-4B0C-BBF1-C7833CA9B2DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:bosch:divar_ip_7000_r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C021F78B-FBA2-4C35-8B26-FF0E3D4B9907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "167DFF9C-69C3-4C70-B8A7-992D8D2AAD95", "versionEndIncluding": "8.0", "versionStartIncluding": "7.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7EE760B-9B65-49A3-92E5-93880C58A628", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_6000_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D313D23C-C0A8-4F36-93F5-9CF39EF6463F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "790EF36F-6C6B-477E-A2B8-369E6D113004", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_4000_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "92342086-0830-4ABE-A3CF-91255FB7D0B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF7AC49B-19B5-474A-B2AD-8801440663B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A981D11-E964-412C-A333-96BB930758CC", "versionEndIncluding": "11.1.1", "versionStartIncluding": "9.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0DE1C9-D3C0-49BF-9FFD-B765F9AF6691", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_7000_r2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1622C8F-3DD5-4112-BE15-C8873EDFA67E", "versionEndIncluding": "11.1.1", "versionStartIncluding": "7.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_7000_r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C27C0C9-7FC8-4B0C-BBF1-C7833CA9B2DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_7000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69B16286-EF3B-4A4A-AB48-4149CFE6C862", "versionEndIncluding": "8.0", "versionStartIncluding": "7.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "10D23E90-110B-4ADC-8417-CD0149D126D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:divar_ip_7000_r3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9BCD391-4552-4375-BCE7-0EF1BD81A03E", "versionEndIncluding": "11.1.1", "versionStartIncluding": "10.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_7000_r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C021F78B-FBA2-4C35-8B26-FF0E3D4B9907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Authorization in SSH server in Bosch VMS 11.0, 11.1.0, and 11.1.1 allows a remote authenticated user to access resources within the trusted internal network via a port forwarding request." } ], "id": "CVE-2023-28175", "lastModified": "2024-11-21T07:54:32.270", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.7, "source": "psirt@bosch.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-15T11:15:09.227", "references": [ { "source": "psirt@bosch.com", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html" } ], "sourceIdentifier": "psirt@bosch.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "psirt@bosch.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }