First published: Wed May 29 2019(Updated: )
A potential improper access control vulnerability exists in the JSON-RPC interface of the Bosch Smart Home Controller (SHC) before 9.8.905 that may result in reading or modification of the SHC's configuration or triggering and restoring backups. In order to exploit the vulnerability, the adversary needs to have successfully paired an app or service, which requires user interaction.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch Smart Home Controller Firmware | <9.8.905 | |
Bosch Smart Home Controller Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11892 has been classified as a high severity vulnerability.
To mitigate CVE-2019-11892, update your Bosch Smart Home Controller firmware to version 9.8.905 or later.
CVE-2019-11892 affects Bosch Smart Home Controller firmware versions prior to 9.8.905.
CVE-2019-11892 can allow unauthorized reading or modification of the Smart Home Controller's configuration.
Currently, there are no official workarounds for CVE-2019-11892 besides updating the firmware.