fkie_cve-2020-6785
Vulnerability from fkie_nvd
Published
2021-03-25 16:15
Modified
2024-11-21 05:36
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
Loading a DLL through an Uncontrolled Search Path Element in Bosch BVMS and BVMS Viewer in versions 10.1.0, 10.0.1, 10.0.0 and 9.0.0 and older potentially allows an attacker to execute arbitrary code on a victim's system. This affects both the installer as well as the installed application. This also affects Bosch DIVAR IP 7000 R2, Bosch DIVAR IP all-in-one 5000 and Bosch DIVAR IP all-in-one 7000 with installers and installed BVMS versions prior to BVMS 10.1.1.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D7D73DA-EDCB-4F57-AAC9-965B63B9F3CF", "versionEndExcluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6559B32-B0A4-47CC-8245-040E5E9B1C47", "versionEndExcluding": "10.0.2", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "355E7A22-FDEE-4C68-9127-4924DB360D38", "versionEndExcluding": "10.1.1", "versionStartIncluding": "10.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_7000_r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C27C0C9-7FC8-4B0C-BBF1-C7833CA9B2DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D7D73DA-EDCB-4F57-AAC9-965B63B9F3CF", "versionEndExcluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6559B32-B0A4-47CC-8245-040E5E9B1C47", "versionEndExcluding": "10.0.2", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "355E7A22-FDEE-4C68-9127-4924DB360D38", "versionEndExcluding": "10.1.1", "versionStartIncluding": "10.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_all-in-one_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "7075A014-A297-4E41-81D8-2535BC2BD4E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D7D73DA-EDCB-4F57-AAC9-965B63B9F3CF", "versionEndExcluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6559B32-B0A4-47CC-8245-040E5E9B1C47", "versionEndExcluding": "10.0.2", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "355E7A22-FDEE-4C68-9127-4924DB360D38", "versionEndExcluding": "10.1.1", "versionStartIncluding": "10.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:divar_ip_all-in-one_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "E531FC6E-B7AF-48DF-ACC2-91B5BD2B68DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:video_management_system_viewer:*:*:*:*:*:*:*:*", "matchCriteriaId": "336DCAFC-E774-457C-82FD-5FD51E385872", "versionEndExcluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system_viewer:*:*:*:*:*:*:*:*", "matchCriteriaId": "02F69D10-E545-472A-83C7-F988EA357CBC", "versionEndExcluding": "10.0.2", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:video_management_system_viewer:*:*:*:*:*:*:*:*", "matchCriteriaId": "24D063D2-7423-4A15-93F9-976597F7742D", "versionEndExcluding": "10.1.1", "versionStartIncluding": "10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Loading a DLL through an Uncontrolled Search Path Element in Bosch BVMS and BVMS Viewer in versions 10.1.0, 10.0.1, 10.0.0 and 9.0.0 and older potentially allows an attacker to execute arbitrary code on a victim\u0027s system. This affects both the installer as well as the installed application. This also affects Bosch DIVAR IP 7000 R2, Bosch DIVAR IP all-in-one 5000 and Bosch DIVAR IP all-in-one 7000 with installers and installed BVMS versions prior to BVMS 10.1.1." }, { "lang": "es", "value": "Cargar una DLL mediante un Elemento de Ruta de B\u00fasqueda no Controlada en Bosch BVMS y BVMS Viewer en las versiones 10.1.0, 10.0.1, 10.0.0 y 9.0.0 y anteriores, permite a un atacante ejecutar c\u00f3digo arbitrario en el sistema de una v\u00edctima.\u0026#xa0;Esto afecta tanto al instalador como a la aplicaci\u00f3n instalada.\u0026#xa0;Esto tambi\u00e9n afecta a Bosch DIVAR IP 7000 R2, Bosch DIVAR IP all-in-one 5000 y Bosch DIVAR IP all-in-one 7000 con instaladores y versiones instaladas de BVMS anteriores a BVMS 10.1.1" } ], "id": "CVE-2020-6785", "lastModified": "2024-11-21T05:36:10.873", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@bosch.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-25T16:15:13.523", "references": [ { "source": "psirt@bosch.com", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html" } ], "sourceIdentifier": "psirt@bosch.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "psirt@bosch.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…