René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

161 lines
4.9 KiB
JSON

{
"id": "CVE-2021-23846",
"sourceIdentifier": "psirt@bosch.com",
"published": "2021-06-18T14:15:07.983",
"lastModified": "2021-06-24T17:22:53.153",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "When using http protocol, the user password is transmitted as a clear text parameter for which it is possible to be obtained by an attacker through a MITM attack. This will be fixed starting from Firmware version 3.11.5, which will be released on the 30th of June, 2021."
},
{
"lang": "es",
"value": "Cuando se usa el protocolo http, la contrase\u00f1a del usuario es transmitida como un par\u00e1metro de texto sin cifrar, por lo que es posible ser obtenida por un atacante mediante un ataque MITM. Esto ser\u00e1 corregido a partir desde Firmware versi\u00f3n 3.11.5, que ser\u00e1 publicado el 30 de junio de 2021"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "psirt@bosch.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
},
{
"source": "psirt@bosch.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:bosch:b426_firmware:03.01.0004:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8D9DF7-C733-4455-A653-D78298D1FABD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:bosch:b426_firmware:03.02.002:*:*:*:*:*:*:*",
"matchCriteriaId": "31D05CDF-6F5E-4893-BA70-928BD83A50D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:bosch:b426_firmware:03.03.0009:*:*:*:*:*:*:*",
"matchCriteriaId": "00336848-27F3-45CD-B799-49BEA4FED80F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:bosch:b426_firmware:03.05.0003:*:*:*:*:*:*:*",
"matchCriteriaId": "AD4F1647-A8A1-4AAF-8C31-0474EC9539F1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:b426:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8846CF6-D7F7-4A65-BD96-F195D2EB1A22"
}
]
}
]
}
],
"references": [
{
"url": "https://psirt.bosch.com/security-advisories/bosch-sa-196933-bt.html",
"source": "psirt@bosch.com",
"tags": [
"Vendor Advisory"
]
}
]
}