First published: Wed May 29 2019(Updated: )
A potential incorrect privilege assignment vulnerability exists in the 3rd party pairing mechanism of the Bosch Smart Home Controller (SHC) before 9.8.907 that may result in a restricted app obtaining default app permissions. In order to exploit the vulnerability, the adversary needs to have successfully paired an app, which requires user interaction.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch Smart Home Controller Firmware | <9.8.907 | |
Bosch Smart Home Controller Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11896 has a severity rating that indicates a potential for privilege escalation in the Bosch Smart Home Controller.
To fix CVE-2019-11896, upgrade the Bosch Smart Home Controller firmware to version 9.8.907 or later.
CVE-2019-11896 affects Bosch Smart Home Controller firmware versions prior to 9.8.907.
CVE-2019-11896 is classified as an incorrect privilege assignment vulnerability.
Exploitation of CVE-2019-11896 requires an adversary to access the pairing mechanism locally.