René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

276 lines
9.1 KiB
JSON

{
"id": "CVE-2020-6785",
"sourceIdentifier": "psirt@bosch.com",
"published": "2021-03-25T16:15:13.523",
"lastModified": "2021-03-25T18:16:22.897",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Loading a DLL through an Uncontrolled Search Path Element in Bosch BVMS and BVMS Viewer in versions 10.1.0, 10.0.1, 10.0.0 and 9.0.0 and older potentially allows an attacker to execute arbitrary code on a victim's system. This affects both the installer as well as the installed application. This also affects Bosch DIVAR IP 7000 R2, Bosch DIVAR IP all-in-one 5000 and Bosch DIVAR IP all-in-one 7000 with installers and installed BVMS versions prior to BVMS 10.1.1."
},
{
"lang": "es",
"value": "Cargar una DLL mediante un Elemento de Ruta de B\u00fasqueda no Controlada en Bosch BVMS y BVMS Viewer en las versiones 10.1.0, 10.0.1, 10.0.0 y 9.0.0 y anteriores, permite a un atacante ejecutar c\u00f3digo arbitrario en el sistema de una v\u00edctima. Esto afecta tanto al instalador como a la aplicaci\u00f3n instalada. Esto tambi\u00e9n afecta a Bosch DIVAR IP 7000 R2, Bosch DIVAR IP all-in-one 5000 y Bosch DIVAR IP all-in-one 7000 con instaladores y versiones instaladas de BVMS anteriores a BVMS 10.1.1"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@bosch.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
},
{
"source": "psirt@bosch.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.0",
"matchCriteriaId": "0D7D73DA-EDCB-4F57-AAC9-965B63B9F3CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndExcluding": "10.0.2",
"matchCriteriaId": "C6559B32-B0A4-47CC-8245-040E5E9B1C47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.1",
"versionEndExcluding": "10.1.1",
"matchCriteriaId": "355E7A22-FDEE-4C68-9127-4924DB360D38"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:divar_ip_7000_r2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C27C0C9-7FC8-4B0C-BBF1-C7833CA9B2DE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.0",
"matchCriteriaId": "0D7D73DA-EDCB-4F57-AAC9-965B63B9F3CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndExcluding": "10.0.2",
"matchCriteriaId": "C6559B32-B0A4-47CC-8245-040E5E9B1C47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.1",
"versionEndExcluding": "10.1.1",
"matchCriteriaId": "355E7A22-FDEE-4C68-9127-4924DB360D38"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:divar_ip_all-in-one_5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7075A014-A297-4E41-81D8-2535BC2BD4E9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.0",
"matchCriteriaId": "0D7D73DA-EDCB-4F57-AAC9-965B63B9F3CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndExcluding": "10.0.2",
"matchCriteriaId": "C6559B32-B0A4-47CC-8245-040E5E9B1C47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.1",
"versionEndExcluding": "10.1.1",
"matchCriteriaId": "355E7A22-FDEE-4C68-9127-4924DB360D38"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:divar_ip_all-in-one_7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E531FC6E-B7AF-48DF-ACC2-91B5BD2B68DB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosch:video_management_system_viewer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.0",
"matchCriteriaId": "336DCAFC-E774-457C-82FD-5FD51E385872"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosch:video_management_system_viewer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndExcluding": "10.0.2",
"matchCriteriaId": "02F69D10-E545-472A-83C7-F988EA357CBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosch:video_management_system_viewer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.1.0",
"versionEndExcluding": "10.1.1",
"matchCriteriaId": "24D063D2-7423-4A15-93F9-976597F7742D"
}
]
}
]
}
],
"references": [
{
"url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
"source": "psirt@bosch.com",
"tags": [
"Vendor Advisory"
]
}
]
}