{ "id": "CVE-2021-23842", "sourceIdentifier": "psirt@bosch.com", "published": "2022-01-19T21:15:08.137", "lastModified": "2022-01-28T17:58:52.223", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Communication to the AMC2 uses a state-of-the-art cryptographic algorithm for symmetric encryption called Blowfish. An attacker could retrieve the key from the firmware to decrypt network traffic between the AMC2 and the host system. Thus, an attacker can exploit this vulnerability to decrypt and modify network traffic, decrypt and further investigate the device\\'s firmware file, and change the device configuration. The attacker needs to have access to the local network, typically even the same subnet." }, { "lang": "es", "value": "La comunicaci\u00f3n con el AMC2 usa un algoritmo criptogr\u00e1fico de \u00faltima generaci\u00f3n para el cifrado sim\u00e9trico llamado Blowfish. Un atacante podr\u00eda recuperar la clave del firmware para descifrar el tr\u00e1fico de red entre el AMC2 y el sistema anfitri\u00f3n. As\u00ed, un atacante puede explotar esta vulnerabilidad para descifrar y modificar el tr\u00e1fico de red, descifrar e investigar el archivo de firmware del dispositivo y cambiar la configuraci\u00f3n del mismo. El atacante necesita tener acceso a la red local, normalmente incluso a la misma subred" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.2 }, { "source": "psirt@bosch.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.1, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 3.6 }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-798" } ] }, { "source": "psirt@bosch.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-321" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:bosch:amc2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3032BCA-136A-470F-BD1D-A05FC5D22782" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:bosch:amc2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B51541D3-C8B6-4C5E-AC77-70A3F3D7D315" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:bosch:access_management_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C98BA3F6-853A-42EA-B7B9-7163AE2A7E74" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:bosch:access_professional_edition:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.8.0", "matchCriteriaId": "28B735B8-BBBB-43BD-A06C-3297E44DA485" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:bosch:building_integration_system:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.9.1", "matchCriteriaId": "95FDA5B3-E4CB-4285-B3E3-C54F3394E9B2" } ] } ] } ], "references": [ { "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html", "source": "psirt@bosch.com", "tags": [ "Mitigation", "Vendor Advisory" ] } ] }