First published: Wed Jan 29 2020(Updated: )
A path traversal vulnerability in the Bosch Video Management System (BVMS) NoTouch deployment allows an unauthenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch Video Management System | <=7.5 | |
Bosch Video Management System | >=8.0<=8.0.329 | |
Bosch Video Management System | >=9.0<=9.0.0.827 | |
Bosch Video Management System | >=10.0<=10.0.0.1225 | |
Bosch Video Management System | <=7.5 | |
Bosch Video Management System | >=8.0<=8.0.0.329 | |
Bosch Video Management System | >=9.0<=9.0.0.827 | |
Bosch Video Management System | >=10.0<=10.0.0.1225 | |
Bosch Divar IP 3000 Firmware | ||
Bosch Divar IP 7000 Firmware | ||
Bosch Divar Ip All-in-one 5000 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6768 refers to a path traversal vulnerability in the Bosch Video Management System (BVMS) NoTouch deployment that allows an unauthenticated remote attacker to read arbitrary files from the Central Server.
The severity of CVE-2020-6768 is high with a CVSS score of 7.5.
CVE-2020-6768 affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329, and 7.5 and older.
An unauthenticated remote attacker can exploit CVE-2020-6768 by performing a path traversal attack to read arbitrary files from the Central Server of the Bosch Video Management System (BVMS) NoTouch deployment.
Yes, the fix for CVE-2020-6768 is to upgrade to a version of Bosch BVMS that is not affected by the vulnerability.