FKIE_CVE-2021-23861
Vulnerability from fkie_nvd - Published: 2021-12-08 22:15 - Updated: 2024-11-21 05:51
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Summary
By executing a special command, an user with administrative rights can get access to extended debug functionality on the VRM allowing an impact on integrity or availability of the installed software. This issue also affects installations of the DIVAR IP and BVMS with VRM installed.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9DD276-15C0-4942-8899-553F7C190320",
"versionEndIncluding": "9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "989D5F9A-D223-4070-82AE-FA79E8B2572C",
"versionEndExcluding": "10.0.2",
"versionStartIncluding": "10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bosch:bosch_video_management_system:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57FA3EF2-6A7C-46FD-A758-92045A3A2DEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bosch:bosch_video_management_system:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF22168-E2A2-47B8-B9BC-104FF1CFDF30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D54B21E5-8C3E-423F-8E49-9F05B41D540B",
"versionEndIncluding": "3.81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31D1E38A-C0F8-421B-B837-3D2FBD132A18",
"versionEndIncluding": "3.82.0057",
"versionStartIncluding": "3.82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7171D63A-3A1A-4235-9317-009D7C85A93C",
"versionEndIncluding": "3.83.0021",
"versionStartIncluding": "3.83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31572EBA-C58A-46E8-88EA-ADE04578E039",
"versionEndIncluding": "4.00.0070",
"versionStartIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:bosch:divar_ip_5000_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2C1615D-2E5F-4D49-B937-05C81AB5414C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:bosch:divar_ip_7000_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CCD42BE-E4B7-43FC-95FB-C97704E5C268",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "By executing a special command, an user with administrative rights can get access to extended debug functionality on the VRM allowing an impact on integrity or availability of the installed software. This issue also affects installations of the DIVAR IP and BVMS with VRM installed."
},
{
"lang": "es",
"value": "Al ejecutar un comando especial, un usuario con derechos administrativos puede conseguir acceso a la funcionalidad extended debug en el VRM permitiendo un impacto en la integridad o disponibilidad del software instalado. Este problema tambi\u00e9n afecta a las instalaciones de DIVAR IP y BVMS con VRM instalado"
}
],
"id": "CVE-2021-23861",
"lastModified": "2024-11-21T05:51:58.313",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2,
"source": "psirt@bosch.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-12-08T22:15:08.543",
"references": [
{
"source": "psirt@bosch.com",
"tags": [
"Vendor Advisory"
],
"url": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html"
}
],
"sourceIdentifier": "psirt@bosch.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-489"
}
],
"source": "psirt@bosch.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…