GSD-2021-23859
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2021-23859",
"description": "An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859",
"id": "GSD-2021-23859"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-23859"
],
"details": "An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859",
"id": "GSD-2021-23859",
"modified": "2023-12-13T01:23:29.929249Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@bosch.com",
"DATE_PUBLIC": "2021-12-08",
"ID": "CVE-2021-23859",
"STATE": "PUBLIC",
"TITLE": "Denial of Service and Authentication Bypass Vulnerability in multiple Bosch products"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BVMS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "11.0",
"version_value": "11.0.0"
},
{
"version_affected": "\u003c",
"version_name": "10.0",
"version_value": "10.0.2"
},
{
"version_affected": "\u003c",
"version_name": "10.1",
"version_value": "10.1.1"
},
{
"version_affected": "\u003c=",
"version_value": "9.0.0"
}
]
}
},
{
"product_name": "DIVAR IP 7000 R2",
"version": {
"version_data": [
{
"configuration": "using vulnerable BVMS version",
"version_affected": "=",
"version_value": "all"
}
]
}
},
{
"product_name": "DIVAR IP all-in-one 5000",
"version": {
"version_data": [
{
"configuration": "using vulnerable BVMS or VRM version",
"version_affected": "=",
"version_value": "all"
}
]
}
},
{
"product_name": "DIVAR IP all-in-one 7000",
"version": {
"version_data": [
{
"configuration": "using vulnerable BVMS or VRM version",
"version_affected": "=",
"version_value": "all"
}
]
}
},
{
"product_name": "VRM",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "4.0",
"version_value": "4.00.0070"
},
{
"version_affected": "\u003c=",
"version_name": "3.83",
"version_value": "3.83.0021"
},
{
"version_affected": "\u003c=",
"version_name": "3.82",
"version_value": "3.82.0057"
},
{
"version_affected": "\u003c=",
"version_value": "3.81"
}
]
}
},
{
"product_name": "VRM Exporter",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.1",
"version_value": "2.10.0008"
}
]
}
},
{
"product_name": "APE",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "3.8.x.x"
}
]
}
},
{
"product_name": "AEC",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.9.1.x"
}
]
}
},
{
"product_name": "BIS",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "4.9"
},
{
"version_affected": "\u003c=",
"version_value": "4.8"
},
{
"version_affected": "\u003c=",
"version_value": "4.7"
}
]
}
}
]
},
"vendor_name": "Bosch"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-703 Improper Check or Handling of Exceptional Conditions"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html",
"refsource": "CONFIRM",
"url": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html"
}
]
},
"source": {
"advisory": "BOSCH-SA-043434-BT",
"discovery": "EXTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "9.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.0.2",
"versionStartIncluding": "10.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bosch:bosch_video_management_system:10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bosch:bosch_video_management_system:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.81",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.82.0057",
"versionStartIncluding": "3.82",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.83.0021",
"versionStartIncluding": "3.83",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.00.0070",
"versionStartIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:bosch:divar_ip_5000_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:bosch:divar_ip_7000_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:bosch:access_easy_controller_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.9.1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:bosch:access_easy_controller:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:bosch:access_professional_edition:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.8.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bosch:building_integration_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.9",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bosch:video_recording_manager_exporter:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.10.0008",
"versionStartIncluding": "2.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@bosch.com",
"ID": "CVE-2021-23859"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2021-12-14T16:33Z",
"publishedDate": "2021-12-08T22:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…