Vulnerabilites related to bosch - monitor_wall
Vulnerability from fkie_nvd
Published
2021-03-25 16:15
Modified
2024-11-21 05:36
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
Loading a DLL through an Uncontrolled Search Path Element in the Bosch Monitor Wall installer up to and including version 10.00.0164 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bosch | monitor_wall | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:monitor_wall:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BAF5133-10CA-4385-867E-AA540A4536DD", "versionEndIncluding": "10.00.0164", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Loading a DLL through an Uncontrolled Search Path Element in the Bosch Monitor Wall installer up to and including version 10.00.0164 potentially allows an attacker to execute arbitrary code on a victim\u0027s system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from." }, { "lang": "es", "value": "Cargar una DLL mediante un Elemento de Ruta de B\u00fasqueda no Controlada en el instalador de Bosch Monitor Wall versiones hasta 10.00.0164 incluy\u00e9ndola, permite a un atacante ejecutar c\u00f3digo arbitrario en el sistema de una v\u00edctima.\u0026#xa0;Un requisito previo es que la v\u00edctima sea enga\u00f1ada para colocar una DLL maliciosa en el mismo directorio desde el que se inicia el instalador" } ], "id": "CVE-2020-6789", "lastModified": "2024-11-21T05:36:11.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@bosch.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-25T16:15:13.807", "references": [ { "source": "psirt@bosch.com", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html" } ], "sourceIdentifier": "psirt@bosch.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "psirt@bosch.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-18 13:15
Modified
2024-11-21 08:02
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
An improper handling of a malformed API request to an API server in Bosch BT software products can allow an unauthenticated attacker to cause a Denial of Service (DoS) situation.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:monitor_wall:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BAF5133-10CA-4385-867E-AA540A4536DD", "versionEndIncluding": "10.00.0164", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:videojet_decoder_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E6615DD-5B39-459D-B6B6-4B3279D5956A", "versionEndIncluding": "10.40.0055", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:videojet_decoder_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "A96A7B0B-4C65-412E-8AB0-BD6098548598", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:videojet_decoder_7523_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEC397B1-12A4-44B7-9BC1-78947B0D042E", "versionEndIncluding": "10.40.0055", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:videojet_decoder_7523:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C771252-5D00-4B5B-B8D2-841F842D36B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9B820C5-8984-4204-A9F5-90D3FE671657", "versionEndIncluding": "04.10.0079", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C4233F9-FF75-476D-991B-5A030AC99CC7", "versionEndIncluding": "8.1.2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D5AC8FA-A1DB-4749-960A-E378B820F0C0", "versionEndIncluding": "9.0.0.178", "versionStartIncluding": "9.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper handling of a malformed API request to an API server in Bosch BT software products can allow an unauthenticated attacker to cause a Denial of Service (DoS) situation." }, { "lang": "es", "value": "Un manejo inadecuado de una solicitud API con formato incorrecto a un servidor API en los productos de software Bosch BT puede permitir que un atacante no autenticado provoque una situaci\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2023-32230", "lastModified": "2024-11-21T08:02:56.827", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@bosch.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-18T13:15:06.790", "references": [ { "source": "psirt@bosch.com", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html" } ], "sourceIdentifier": "psirt@bosch.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-703" } ], "source": "psirt@bosch.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2020-6789 (GCVE-0-2020-6789)
Vulnerability from cvelistv5
Published
2021-03-25 15:53
Modified
2024-09-16 19:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-427 - Uncontrolled Search Path Element
Summary
Loading a DLL through an Uncontrolled Search Path Element in the Bosch Monitor Wall installer up to and including version 10.00.0164 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Bosch | Monitor Wall |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:11:05.080Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Monitor Wall", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "10.00.0164", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Dhiraj Mishra" } ], "datePublic": "2021-03-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Loading a DLL through an Uncontrolled Search Path Element in the Bosch Monitor Wall installer up to and including version 10.00.0164 potentially allows an attacker to execute arbitrary code on a victim\u0027s system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-25T15:53:03", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html" } ], "source": { "advisory": "BOSCH-SA-835563-BT", "discovery": "EXTERNAL" }, "title": "Uncontrolled Search Path Element in Bosch Monitor Wall Installer", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2021-03-24", "ID": "CVE-2020-6789", "STATE": "PUBLIC", "TITLE": "Uncontrolled Search Path Element in Bosch Monitor Wall Installer" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Monitor Wall", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "10.00.0164" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "credit": [ { "lang": "eng", "value": "Dhiraj Mishra" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Loading a DLL through an Uncontrolled Search Path Element in the Bosch Monitor Wall installer up to and including version 10.00.0164 potentially allows an attacker to execute arbitrary code on a victim\u0027s system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427 Uncontrolled Search Path Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html" } ] }, "source": { "advisory": "BOSCH-SA-835563-BT", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2020-6789", "datePublished": "2021-03-25T15:53:03.874748Z", "dateReserved": "2020-01-10T00:00:00", "dateUpdated": "2024-09-16T19:29:59.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-32230 (GCVE-0-2023-32230)
Vulnerability from cvelistv5
Published
2023-12-18 12:58
Modified
2024-08-02 15:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-703 - Improper Check or Handling of Exceptional Conditions
Summary
An improper handling of a malformed API request to an API server in Bosch BT software products can allow an unauthenticated attacker to cause a Denial of Service (DoS) situation.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | Video Recording Manager |
Version: 0 < |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:10:24.221Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Video Recording Manager", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "04.10.0079", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "product": "Video Streaming Gateway", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "8.1.2.2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "9.0.0.178", "status": "affected", "version": "9.0.0", "versionType": "custom" } ] }, { "product": "Monitorwall", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "10.00.0164", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "product": "VJD-7513", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "10.40.0055", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "product": "VJD-7523", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "10.40.0055", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper handling of a malformed API request to an API server in Bosch BT software products can allow an unauthenticated attacker to cause a Denial of Service (DoS) situation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703 Improper Check or Handling of Exceptional Conditions", "lang": "en-US" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-18T12:58:08.690Z", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html", "tags": [ "vendor-advisory" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html" } ] } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2023-32230", "datePublished": "2023-12-18T12:58:08.690Z", "dateReserved": "2023-05-04T21:01:16.508Z", "dateUpdated": "2024-08-02T15:10:24.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }