CVE-2020-6770 (GCVE-0-2020-6770)
Vulnerability from cvelistv5
Published
2020-02-07 20:08
Modified
2024-09-17 04:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-502 - Deserialization of Untrusted Data
Summary
Deserialization of Untrusted Data in the BVMS Mobile Video Service (BVMS MVS) allows an unauthenticated remote attacker to execute arbitrary code on the system. This affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000 and DIVAR IP 7000 if a vulnerable BVMS version is installed.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bosch | DIVAR IP 3000 |
Version: All |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:11:04.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-885551-BT.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "DIVAR IP 3000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "DIVAR IP 7000", "vendor": "Bosch", "versions": [ { "status": "affected", "version": "All" } ] }, { "product": "BVMS Mobile Video Service", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "8.0.0.329", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "9.0.0.827", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "10.0.0.1225", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "7.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data in the BVMS Mobile Video Service (BVMS MVS) allows an unauthenticated remote attacker to execute arbitrary code on the system. This affects Bosch BVMS versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000 and DIVAR IP 7000 if a vulnerable BVMS version is installed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-07T20:08:31", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-885551-BT.html" } ], "source": { "advisory": "BOSCH-SA-885551-BT", "discovery": "INTERNAL" }, "title": "Deserialization of Untrusted Data in Bosch BVMS Mobile Video Service", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2020-01-29T13:00:00.000Z", "ID": "CVE-2020-6770", "STATE": "PUBLIC", "TITLE": "Deserialization of Untrusted Data in Bosch BVMS Mobile Video Service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "DIVAR IP 3000", "version": { "version_data": [ { "configuration": "vulnerable BVMS MVS version installed", "version_affected": "=", "version_value": "All" } ] } } ] }, "vendor_name": "Bosch" }, { "product": { "product_data": [ { "product_name": "DIVAR IP 7000", "version": { "version_data": [ { "configuration": "vulnerable BVMS MVS version installed", "version_affected": "=", "version_value": "All" } ] } } ] }, "vendor_name": "Bosch" }, { "product": { "product_data": [ { "product_name": "BVMS Mobile Video Service", "version": { "version_data": [ { "configuration": "patch for security issue 243748 not installed", "version_affected": "\u003c=", "version_value": "8.0.0.329" }, { "configuration": "patch for security issue 243748 not installed", "version_affected": "\u003c=", "version_value": "9.0.0.827" }, { "configuration": "patch for security issue 243748 not installed", "version_affected": "\u003c=", "version_value": "10.0.0.1225" }, { "version_affected": "\u003c=", "version_value": "7.5" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Deserialization of Untrusted Data in the BVMS Mobile Video Service (BVMS MVS) allows an unauthenticated remote attacker to execute arbitrary code on the system. This affects Bosch BVMS versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000 and DIVAR IP 7000 if a vulnerable BVMS version is installed." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-502 Deserialization of Untrusted Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-885551-BT.html", "refsource": "CONFIRM", "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-885551-BT.html" } ] }, "source": { "advisory": "BOSCH-SA-885551-BT", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2020-6770", "datePublished": "2020-02-07T20:08:31.437569Z", "dateReserved": "2020-01-10T00:00:00", "dateUpdated": "2024-09-17T04:09:12.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-6770\",\"sourceIdentifier\":\"psirt@bosch.com\",\"published\":\"2020-02-07T21:15:10.760\",\"lastModified\":\"2024-11-21T05:36:09.940\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Deserialization of Untrusted Data in the BVMS Mobile Video Service (BVMS MVS) allows an unauthenticated remote attacker to execute arbitrary code on the system. This affects Bosch BVMS versions 10.0 \u003c= 10.0.0.1225, 9.0 \u003c= 9.0.0.827, 8.0 \u003c= 8.0.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000 and DIVAR IP 7000 if a vulnerable BVMS version is installed.\"},{\"lang\":\"es\",\"value\":\"Una Deserializaci\u00f3n de Datos No Confiables en el BVMS Mobile Video Service (BVMS MVS), permite a un atacante remoto no autenticado ejecutar c\u00f3digo arbitrario sobre el sistema. Esto afecta Bosch BVMS versiones 10.0 anteriores a 10.0.0.1225 incluy\u00e9ndola, 9.0 anteriores a 9.0.0.827 incluy\u00e9ndola, 8.0 anteriores a 8.0.0.329 incluy\u00e9ndola y 7.5 y anteriores. Esto afecta a Bosch DIVAR IP 3000 y DIVAR IP 7000 si una versi\u00f3n vulnerable de BVMS es instalada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@bosch.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@bosch.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:bosch_video_management_system_mobile_video_service:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.5\",\"matchCriteriaId\":\"EC942683-9FC3-4C2B-9502-91B3DCBF94D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:bosch_video_management_system_mobile_video_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0\",\"versionEndIncluding\":\"8.0.0.329\",\"matchCriteriaId\":\"BCDA17DC-C03A-4732-A00E-30DA535B2F42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:bosch_video_management_system_mobile_video_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0\",\"versionEndIncluding\":\"9.0.0.827\",\"matchCriteriaId\":\"D1CDC5D3-12F9-4AEA-9396-7839405348C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bosch:bosch_video_management_system_mobile_video_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0\",\"versionEndIncluding\":\"10.0.0.1225\",\"matchCriteriaId\":\"4FE6B5DA-C720-4368-BFDB-B12626B23F25\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bosch:divar_ip_3000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C3A02A4-2AD4-45A8-AD9D-239A536A8D66\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bosch:divar_ip_3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7EE760B-9B65-49A3-92E5-93880C58A628\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bosch:divar_ip_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CCD42BE-E4B7-43FC-95FB-C97704E5C268\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bosch:divar_ip_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D23E90-110B-4ADC-8417-CD0149D126D2\"}]}]}],\"references\":[{\"url\":\"https://psirt.bosch.com/security-advisories/BOSCH-SA-885551-BT.html\",\"source\":\"psirt@bosch.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://psirt.bosch.com/security-advisories/BOSCH-SA-885551-BT.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…