First published: Wed Jan 29 2020(Updated: )
A path traversal vulnerability in the Bosch Video Management System (BVMS) FileTransferService allows an authenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch Video Management System Viewer | <=7.5 | |
Bosch Video Management System Viewer | >=8.0<=8.0.329 | |
Bosch Video Management System Viewer | >=9.0<=9.0.0.827 | |
Bosch Video Management System Viewer | >=10.0<=10.0.0.1225 | |
Bosch Video Management System | <=7.5 | |
Bosch Video Management System | >=8.0<=8.0.0.329 | |
Bosch Video Management System | >=9.0<=9.0.0.827 | |
Bosch Video Management System | >=10.0<=10.0.0.1225 | |
Bosch DIVAR IP 3000 | ||
Bosch Divar Ip 7000 | ||
Bosch DIVAR IP all-in-one 5000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this path traversal vulnerability is CVE-2020-6767.
The affected software for this vulnerability is the Bosch Video Management System (BVMS) FileTransferService.
This vulnerability allows an authenticated remote attacker to read arbitrary files from the Central Server.
The affected versions of the Bosch BVMS are 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329, and 7.5 and older.
The severity level of this vulnerability is high.
The Common Weakness Enumeration (CWE) ID for this vulnerability is CWE-22.
You can find more information about this vulnerability in the following references: [Link 1](https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-sa-381489-bt_cve-2020-6767_securityadvisory_bvms_pathtraversal.pdf) and [Link 2](https://psirt.bosch.com/security-advisories/BOSCH-SA-381489-BT.html).