Latest CVE Feed
-
9.0
HIGHCVE-2021-23862
A crafted configuration packet sent by an authenticated administrative user can be used to execute arbitrary commands in system context. This issue also affects installations of the VRM, DIVAR IP, BVMS with VRM installed, the VIDEOJET decoder (VJD-7513 an... Read more
Affected Products : bosch_video_management_system video_recording_manager divar_ip_5000_firmware divar_ip_7000_firmware videojet_decoder_7513_firmware videojet_decoder_8000_firmware divar_ip_7000_r2_firmware divar_ip_all-in-one_5000_firmware divar_ip_all-in-one_7000_firmware videojet_decoder_7513 +1 more products- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-23861
By executing a special command, an user with administrative rights can get access to extended debug functionality on the VRM allowing an impact on integrity or availability of the installed software. This issue also affects installations of the DIVAR IP a... Read more
- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-23860
An error in a page handler of the VRM may lead to a reflected cross site scripting (XSS) in the web-based interface. To exploit this vulnerability an attack must be able to modify the HTTP header that is sent. This issue also affects installations of the ... Read more
- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-23859
An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On... Read more
Affected Products : access_professional_edition bosch_video_management_system building_integration_system video_recording_manager access_easy_controller_firmware divar_ip_5000_firmware divar_ip_7000_firmware video_recording_manager_exporter divar_ip_7000_r2_firmware divar_ip_all-in-one_5000_firmware +2 more products- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
8.6
HIGHCVE-2021-23858
Information disclosure: The main configuration, including users and their hashed passwords, is exposed by an unprotected web server resource and can be accessed without authentication. Additionally, device details are exposed which include the serial numb... Read more
Affected Products : rexroth_indramotion_mlc_l20_firmware rexroth_indramotion_mlc_l40_firmware rexroth_indramotion_mlc_l25_firmware rexroth_indramotion_mlc_l45_firmware rexroth_indramotion_mlc_l65_firmware rexroth_indramotion_mlc_l75_firmware rexroth_indramotion_mlc_l85_firmware rexroth_indramotion_mlc_xm22_firmware rexroth_indramotion_mlc_xm21_firmware rexroth_indramotion_mlc_xm41_firmware +14 more products- Published: Oct. 04, 2021
- Modified: Nov. 21, 2024
-
10.0
CRITICALCVE-2021-23857
Login with hash: The login routine allows the client to log in to the system not by using the password, but by using the hash of the password. Combined with CVE-2021-23858, this allows an attacker to subsequently login to the system.... Read more
Affected Products : rexroth_indramotion_xlc_firmware rexroth_indramotion_mlc_l20_firmware rexroth_indramotion_mlc_l40_firmware rexroth_indramotion_mlc_l25_firmware rexroth_indramotion_mlc_l45_firmware rexroth_indramotion_mlc_l65_firmware rexroth_indramotion_mlc_l75_firmware rexroth_indramotion_mlc_l85_firmware rexroth_indramotion_mlc_xm22_firmware rexroth_indramotion_mlc_xm21_firmware +14 more products- Published: Oct. 04, 2021
- Modified: Nov. 21, 2024
-
10.0
CRITICALCVE-2021-23856
The web server is vulnerable to reflected XSS and therefore an attacker might be able to execute scripts on a client’s computer by sending the client a manipulated URL.... Read more
- Published: Oct. 04, 2021
- Modified: Nov. 21, 2024
-
8.6
HIGHCVE-2021-23855
The user and password data base is exposed by an unprotected web server resource. Passwords are hashed with a weak hashing algorithm and therefore allow an attacker to determine the password by using rainbow tables.... Read more
- Published: Oct. 04, 2021
- Modified: Nov. 21, 2024
-
8.3
HIGHCVE-2021-23854
An error in the handling of a page parameter in Bosch IP cameras may lead to a reflected cross site scripting (XSS) in the web-based interface. This issue only affects versions 7.7x and 7.6x. All other versions are not affected.... Read more
Affected Products : cpp6_firmware cpp7_firmware cpp7.3_firmware cpp13_firmware cpp6 cpp7 cpp7.3 cpp13- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23853
In Bosch IP cameras, improper validation of the HTTP header allows an attacker to inject arbitrary HTTP headers through crafted URLs.... Read more
Affected Products : cpp6_firmware cpp7_firmware cpp7.3_firmware cpp4_firmware cpp13_firmware cpp6 cpp7 cpp7.3 cpp4 cpp13- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2021-23852
An authenticated attacker with administrator rights Bosch IP cameras can call an URL with an invalid parameter that causes the camera to become unresponsive for a few seconds and cause a Denial of Service (DoS).... Read more
Affected Products : cpp6_firmware cpp7_firmware cpp7.3_firmware cpp4_firmware cpp13_firmware cpp6 cpp7 cpp7.3 cpp4 cpp13- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
7.2
HIGHCVE-2021-23851
A specially crafted TCP/IP packet may cause the camera recovery image web interface to crash. It may also cause a buffer overflow which could enable remote code execution. The recovery image can only be booted with administrative rights or with physical a... Read more
Affected Products : autodome_ip_4000i_firmware autodome_ip_5000i_firmware autodome_ip_starlight_5000i_firmware autodome_ip_starlight_7000i_firmware dinion_ip_3000i_firmware dinion_ip_bullet_4000i_firmware dinion_ip_bullet_5000_firmware dinion_ip_bullet_5000i_firmware dinion_ip_bullet_6000i_firmware flexidome_ip_3000i_firmware +126 more products- Published: Mar. 30, 2022
- Modified: Nov. 21, 2024
-
7.2
HIGHCVE-2021-23850
A specially crafted TCP/IP packet may cause a camera recovery image telnet interface to crash. It may also cause a buffer overflow which could enable remote code execution. The recovery image can only be booted with administrative rights or with physical ... Read more
Affected Products : autodome_ip_4000i_firmware autodome_ip_5000i_firmware autodome_ip_starlight_5000i_firmware autodome_ip_starlight_7000i_firmware dinion_ip_3000i_firmware dinion_ip_bullet_4000i_firmware dinion_ip_bullet_5000_firmware dinion_ip_bullet_5000i_firmware dinion_ip_bullet_6000i_firmware flexidome_ip_3000i_firmware +126 more products- Published: Mar. 30, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-23849
A vulnerability in the web-based interface allows an unauthenticated remote attacker to trigger actions on an affected system on behalf of another user (CSRF - Cross Site Request Forgery). This requires the victim to be tricked into clicking a malicious l... Read more
Affected Products : cpp6_firmware cpp7_firmware cpp7.3_firmware cpp4_firmware cpp13_firmware aviotec_firmware cpp14_firmware cpp6 cpp7 cpp7.3 +4 more products- Published: Aug. 05, 2021
- Modified: Nov. 21, 2024
-
8.3
HIGHCVE-2021-23848
An error in the URL handler Bosch IP cameras may lead to a reflected cross site scripting (XSS) in the web-based interface. An attacker with knowledge of the camera address can send a crafted link to a user, which will execute javascript code in the conte... Read more
Affected Products : cpp6_firmware cpp7_firmware cpp7.3_firmware cpp4_firmware cpp13_firmware cpp6 cpp7 cpp7.3 cpp4 cpp13- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23847
A Missing Authentication in Critical Function in Bosch IP cameras allows an unauthenticated remote attacker to extract sensitive information or change settings of the camera by sending crafted requests to the device. Only devices of the CPP6, CPP7 and CPP... Read more
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-23846
When using http protocol, the user password is transmitted as a clear text parameter for which it is possible to be obtained by an attacker through a MITM attack. This will be fixed starting from Firmware version 3.11.5, which will be released on the 30th... Read more
- Published: Jun. 18, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-23845
This vulnerability could allow an attacker to hijack a session while a user is logged in the configuration web page. This vulnerability was discovered by a security researcher in B426 and found during internal product tests in B426-CN/B429-CN, and B426-M ... Read more
Affected Products : b426_firmware b426-cn_firmware b429-cn_firmware b426-m_firmware b426 b426-cn b429-cn b426-m- Published: Jun. 18, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-23843
The Bosch software tools AccessIPConfig.exe and AmcIpConfig.exe are used to configure certains settings in AMC2 devices. The tool allows putting a password protection on configured devices to restrict access to the configuration of an AMC2. An attacker ca... Read more
Affected Products : access_professional_edition building_integration_system amc2_firmware access_management_system amc2- Published: Jan. 19, 2022
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-23842
Communication to the AMC2 uses a state-of-the-art cryptographic algorithm for symmetric encryption called Blowfish. An attacker could retrieve the key from the firmware to decrypt network traffic between the AMC2 and the host system. Thus, an attacker can... Read more
Affected Products : access_professional_edition building_integration_system amc2_firmware access_management_system amc2- Published: Jan. 19, 2022
- Modified: Nov. 21, 2024