Lucene search

K
cvelistBoschCVELIST:CVE-2020-6769
HistoryJan 29, 2020 - 12:00 a.m.

CVE-2020-6769 Missing Authentication for Critical Function in Bosch Video Streaming Gateway

2020-01-2900:00:00
CWE-306
bosch
www.cve.org

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.5%

Missing Authentication for Critical Function in the Bosch Video Streaming Gateway (VSG) allows an unauthenticated remote attacker to retrieve and set arbitrary configuration data of the Video Streaming Gateway. A successful attack can impact the confidentiality and availability of live and recorded video data of all cameras configured to be controlled by the VSG as well as the recording storage associated with the VSG. This affects Bosch Video Streaming Gateway versions 6.45 <= 6.45.08, 6.44 <= 6.44.022, 6.43 <= 6.43.0023 and 6.42.10 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable VSG version is installed with BVMS. This affects Bosch DIVAR IP 2000 <= 3.62.0019 and DIVAR IP 5000 <= 3.80.0039 if the corresponding port 8023 has been opened in the device’s firewall.

CNA Affected

[
  {
    "product": "DIVAR IP 2000",
    "vendor": "Bosch",
    "versions": [
      {
        "lessThanOrEqual": "3.62.0019",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "DIVAR IP 5000",
    "vendor": "Bosch",
    "versions": [
      {
        "lessThanOrEqual": "3.80.0039",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Video Streaming Gateway",
    "vendor": "Bosch",
    "versions": [
      {
        "lessThanOrEqual": "6.45.08",
        "status": "affected",
        "version": "6.45",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "6.44.0030",
        "status": "affected",
        "version": "6.44",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "6.43.0023",
        "status": "affected",
        "version": "6.43",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "6.42.10",
        "status": "affected",
        "version": "6.42 and older",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "DIVAR IP 3000",
    "vendor": "Bosch",
    "versions": [
      {
        "status": "affected",
        "version": "All"
      }
    ]
  },
  {
    "product": "DIVAR IP 7000",
    "vendor": "Bosch",
    "versions": [
      {
        "status": "affected",
        "version": "All"
      }
    ]
  },
  {
    "product": "DIVAR IP all-in-one 5000",
    "vendor": "Bosch",
    "versions": [
      {
        "status": "affected",
        "version": "All"
      }
    ]
  }
]

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.5%

Related for CVELIST:CVE-2020-6769