fkie_cve-2022-32540
Vulnerability from fkie_nvd
Published
2022-09-30 17:15
Modified
2024-11-21 07:06
Severity ?
Summary
Information Disclosure in Operator Client application in BVMS 10.1.1, 11.0 and 11.1.0 and VIDEOJET Decoder VJD-7513 versions 10.23 and 10.30 allows man-in-the-middle attacker to compromise confidential video stream. This is only applicable for UDP encryption when target system contains cameras with platform CPP13 or CPP14 and firmware version 8.x.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bosch | bosch_video_management_system | * | |
bosch | bosch_video_management_system | * | |
bosch | bosch_video_management_system | 11.0 | |
bosch | videojet_decoder_7513_firmware | 10.23.0002 | |
bosch | videojet_decoder_7513_firmware | 10.30.0005 | |
bosch | videojet_decoder_7513 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD731DAC-BFBB-4A0B-80D2-7B96AD570739", "versionEndIncluding": "10.1.1", "versionStartIncluding": "10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "74B38180-71C8-4C4E-8079-AD66AA9822BF", "versionEndIncluding": "11.1.0", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bosch:bosch_video_management_system:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "1FF22168-E2A2-47B8-B9BC-104FF1CFDF30", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:videojet_decoder_7513_firmware:10.23.0002:*:*:*:*:*:*:*", "matchCriteriaId": "C486DC73-F6C1-4A4A-896B-E613B2DBEF55", "vulnerable": true }, { "criteria": "cpe:2.3:o:bosch:videojet_decoder_7513_firmware:10.30.0005:*:*:*:*:*:*:*", "matchCriteriaId": "DF3AFA6F-2DAB-4D5D-8AE3-1948563548E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:videojet_decoder_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "A96A7B0B-4C65-412E-8AB0-BD6098548598", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information Disclosure in Operator Client application in BVMS 10.1.1, 11.0 and 11.1.0 and VIDEOJET Decoder VJD-7513 versions 10.23 and 10.30 allows man-in-the-middle attacker to compromise confidential video stream. This is only applicable for UDP encryption when target system contains cameras with platform CPP13 or CPP14 and firmware version 8.x." }, { "lang": "es", "value": "Una divulgaci\u00f3n de informaci\u00f3n en la aplicaci\u00f3n Operator Client en BVMS versiones 10.1.1, 11.0 y 11.1.0 y VIDEOJET Decoder VJD-7513 versiones 10.23 y 10.30, permite a un atacante de tipo man-in-the-middle comprometer el flujo de v\u00eddeo confidencial. Esto s\u00f3lo es aplicable para la codificaci\u00f3n UDP cuando el sistema de destino contiene c\u00e1maras con plataforma CPP13 o CPP14 y versi\u00f3n de firmware 8.x" } ], "id": "CVE-2022-32540", "lastModified": "2024-11-21T07:06:35.510", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "psirt@bosch.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-30T17:15:12.890", "references": [ { "source": "psirt@bosch.com", "tags": [ "Broken Link" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-464066.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://psirt.bosch.com/security-advisories/bosch-sa-464066.html" } ], "sourceIdentifier": "psirt@bosch.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "psirt@bosch.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…