{"id": "CVE-2023-35867", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "
[email protected]", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 2.2}, {"type": "Primary", "source": "
[email protected]", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 2.2}]}, "published": "2023-12-18T13:15:07.010", "references": [{"url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html", "tags": ["Vendor Advisory"], "source": "
[email protected]"}, {"url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "
[email protected]", "description": [{"lang": "en", "value": "CWE-703"}]}, {"type": "Primary", "source": "
[email protected]", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "An improper handling of a malformed API answer packets to API clients in Bosch BT software products can allow an unauthenticated attacker to cause a Denial of Service (DoS) situation. To exploit this vulnerability an attacker has to replace an existing API server e.g. through Man-in-the-Middle attacks."}, {"lang": "es", "value": "Un manejo inadecuado de paquetes de respuesta API con formato incorrecto para clientes API en productos de software Bosch BT puede permitir que un atacante no autenticado provoque una situaci\u00f3n de denegaci\u00f3n de servicio (DoS). Para aprovechar esta vulnerabilidad, un atacante debe reemplazar un servidor API existente, por ejemplo mediante ataques Man-in-the-Middle."}], "lastModified": "2024-11-21T08:08:51.793", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bosch:building_integration_system_video_engine:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F28540F2-5651-4443-8B98-F3880609FDF4", "versionEndIncluding": "5.0.1"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E174ECD4-2F81-4F4D-81D5-2D6449E776C5", "versionEndIncluding": "12.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bosch:video_management_system_viewer:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEF983D4-76C3-4B0B-B5D4-38B382817827", "versionEndIncluding": "12.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bosch:configuration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B63F7045-9EA4-4ACA-851C-DF1D6B444022", "versionEndIncluding": "7.62"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:bosch:divar_ip_7000_r2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBE6F03E-7671-45D3-9C9F-19112D8422D2", "versionEndIncluding": "12.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:bosch:divar_ip_7000_r2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7C27C0C9-7FC8-4B0C-BBF1-C7833CA9B2DE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:bosch:divar_ip_all-in-one_4000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E2F28D9-444C-4FE8-8129-57A65397380D", "versionEndIncluding": "12.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:bosch:divar_ip_all-in-one_4000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "058E1EC6-5D7E-4AA4-AC6F-B235753AF06F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:bosch:divar_ip_all-in-one_5000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3475E4D-0F6A-4D7E-A667-F3B90F679535", "versionEndIncluding": "12.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:bosch:divar_ip_all-in-one_5000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7075A014-A297-4E41-81D8-2535BC2BD4E9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:bosch:divar_ip_all-in-one_6000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F70C23B-1262-458A-89DA-56C767D23E46", "versionEndIncluding": "12.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:bosch:divar_ip_all-in-one_6000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "56136987-D034-4001-9D91-86205EA42C82"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:bosch:divar_ip_all-in-one_7000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40AE6FA0-24E1-4E16-BF04-FF267769C090", "versionEndIncluding": "12.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:bosch:divar_ip_all-in-one_7000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E531FC6E-B7AF-48DF-ACC2-91B5BD2B68DB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:bosch:divar_ip_all-in-one_7000_r3_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F993333-427F-4EA8-B509-63324D40C272", "versionEndIncluding": "12.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:bosch:divar_ip_all-in-one_7000_r3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5AF06298-9397-4111-9660-637A7A4484FA"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bosch:intelligent_insights:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC6B338D-31A4-4192-936A-CD462112822F", "versionEndIncluding": "1.0.3.14"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bosch:_onvif_camera_event_driver_tool:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8169AFEE-532B-4A40-B7E5-D1E8BDF29FF5", "versionEndIncluding": "2.0.0.8"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bosch:project_assistant:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39DB5F35-7309-4B50-817B-6DD03AC64A91", "versionEndIncluding": "2.3"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bosch:video_security_client:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C32C11F-D04D-4CE1-A8A4-68D5DF11F041", "versionEndIncluding": "3.3.5"}], "operator": "OR"}]}], "sourceIdentifier": "
[email protected]"}