CVE-2019-11684 (GCVE-0-2019-11684)
Vulnerability from cvelistv5
Published
2021-02-26 15:05
Modified
2024-09-17 01:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 < v3.71.0034 and v3.81 < 3.81.0050; DIVAR IP 5000 3.80 < 3.80.0039; BVMS all versions using VRM.
References
► | URL | Tags | |
---|---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:03:32.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 \u003c v3.71.0034 and v3.81 \u003c 3.81.0050; DIVAR IP 5000 3.80 \u003c 3.80.0039; BVMS all versions using VRM." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-26T15:05:45", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html" } ], "source": { "advisory": "BOSCH-SA-804652-BT", "discovery": "INTERNAL" }, "title": "Improper Access Control in Bosch Video Recording Manager", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_PUBLIC": "2019-05-09", "ID": "CVE-2019-11684", "STATE": "PUBLIC", "TITLE": "Improper Access Control in Bosch Video Recording Manager" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 \u003c v3.71.0034 and v3.81 \u003c 3.81.0050; DIVAR IP 5000 3.80 \u003c 3.80.0039; BVMS all versions using VRM." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/bosch-sa-804652.html" } ] }, "source": { "advisory": "BOSCH-SA-804652-BT", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-11684", "datePublished": "2021-02-26T15:05:45.533535Z", "dateReserved": "2019-05-02T00:00:00", "dateUpdated": "2024-09-17T01:22:05.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-11684\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-02-26T16:15:12.217\",\"lastModified\":\"2024-11-21T04:21:35.223\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 \u003c v3.71.0034 and v3.81 \u003c 3.81.0050; DIVAR IP 5000 3.80 \u003c 3.80.0039; BVMS all versions using VRM.\"},{\"lang\":\"es\",\"value\":\"Un control de acceso inapropiado en el servidor RCP+ del componente Bosch Video Recording Manager (VRM), permite el acceso arbitrario y no autenticado a un subconjunto limitado de certificados, almacenados en el sistema operativo subyacente de Microsoft Windows.\u0026#xa0;Las versiones corregidas implementan comprobaciones de autenticaci\u00f3n modificadas.\u0026#xa0;Las versiones anteriores a 3.70 del software VRM no son consideradas afectadas.\u0026#xa0;Esta vulnerabilidad afecta a VRM versiones v3.70.x, v3.71 anteriores a v3.71.0034 y versiones v3.81 anteriores a 3.81.0050;\u0026#xa0;DIVAR IP 5000 versiones 3.80 anteriores a 3.80.0039;\u0026#xa0;BVMS todas las versiones que usan VRM\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L\",\"baseScore\":9.9,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":5.3},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.70\",\"versionEndExcluding\":\"3.71.0034\",\"matchCriteriaId\":\"3BF60397-29D1-4764-913F-96F07DE1A403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.81\",\"versionEndExcluding\":\"3.81.0050\",\"matchCriteriaId\":\"B3E94AB7-ABC6-4B3C-97A9-78A8495E793A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.80\",\"versionEndExcluding\":\"3.80.0039\",\"matchCriteriaId\":\"8D5204C5-A853-408E-A7DA-8312056693F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB0DE1C9-D3C0-49BF-9FFD-B765F9AF6691\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.70.0056:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"230D1A5C-D2B1-48E9-A9A1-EDE65491B715\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.70.0058:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60BD9A29-1D4C-44AC-8169-DCDABD21424E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.70.0060:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB8AC9A-7802-4D29-BA8A-FB2E300F3CF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.70.0062:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BE9BAD2-B925-4507-805D-0006850CF815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.71.0022:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B53DABF-8D3C-4470-A981-12363D230938\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.71.0029:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68F65CA5-9032-4DF3-8FA5-122B571DC4A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.71.0031:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"800E0CBC-591B-4EDC-9E3D-633AD3921F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.71.0032:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"327610AC-25F3-4017-9F19-EA13CAE9EC1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.81.0032:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD6ED4A-EAE2-4AD6-AF48-A6383B9F8257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.81.0038:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8514A9F2-D0AC-4AD4-878C-C1E21D2029E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:video_management_system:3.81.0048:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4677B06D-B4A9-4892-B735-71FE614E51FD\"}]}]}],\"references\":[{\"url\":\"https://psirt.bosch.com/security-advisories/bosch-sa-804652.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://psirt.bosch.com/security-advisories/bosch-sa-804652.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…