Unknown
Improper Access Control for Bosch Video Systems, PSIM and Access Control Systems
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Improper Access Control for Bosch Video Systems, PSIM and Access Control Systems
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The RCP+ network port allows access without authentication. Adding authentication feature to the respective library fixes the issue. The issue is classified as “CWE-284: Improper Access Control.” This vulnerability, for example, allows a potential attacker to delete video or read video data.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- access easy controller firmware 2.1.8.5,
- access easy controller firmware 2.1.9.0,
- access easy controller firmware 2.1.9.1,
- access easy controller firmware 2.1.9.3,
- access professional edition,
- bosch video client,
- bosch video management system,
- building integration system,
- building integration system 4.5,
- building integration system 4.6,
- building integration system 4.6.1,
- configuration manager,
- dip 2000 firmware,
- dip 3000 firmware -,
- dip 5000 firmware,
- dip 7000 firmware -,
- video sdk
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: