Lucene search

K
cvelistBoschCVELIST:CVE-2023-35867
HistoryDec 18, 2023 - 12:59 p.m.

CVE-2023-35867

2023-12-1812:59:48
bosch
www.cve.org
bosch bt
api
dos
unauthenticated
vulnerability
mitm

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

20.4%

An improper handling of a malformed API answer packets to API clients in Bosch BT software products can allow an unauthenticated attacker to cause a Denial of Service (DoS) situation. To exploit this vulnerability an attacker has to replace an existing API server e.g. through Man-in-the-Middle attacks.

CNA Affected

[
  {
    "vendor": "Bosch",
    "product": "BVMS",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "12.0.0"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "BVMS Viewer",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "12.0.0"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "Configuration Manager",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "7.62"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "DIVAR IP 7000 R2",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "12.0.0"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "DIVAR IP all-in-one 5000",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "12.0.0"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "DIVAR IP all-in-one 7000",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "12.0.0"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "DIVAR IP all-in-one 7000 R3",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "12.0.0"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "DIVAR IP all-in-one 4000",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "12.0.0"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "DIVAR IP all-in-one 6000",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "12.0.0"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "Project Assistant",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "2.3"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "Video Security Client",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.5"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "BIS Video Engine",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "5.0.1"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "Intelligent Insights",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "1.0.3.14"
      }
    ]
  },
  {
    "vendor": "Bosch",
    "product": "ONVIF Camera Event Driver Tool",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "2.0.0.8"
      }
    ]
  }
]

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

20.4%

Related for CVELIST:CVE-2023-35867