First published: Thu Jan 14 2021(Updated: )
A vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an unauthenticated remote attacker to trigger actions on an affected system on behalf of another user (Cross-Site Request Forgery). This requires the victim to be tricked into clicking a malicious link or submitting a malicious form. A successful exploit allows the attacker to perform arbitrary actions with the privileges of the victim, e.g. creating and modifying user accounts, changing system configuration settings and cause DoS conditions. Note: For Bosch PRAESIDEO 4.31 and newer and Bosch PRAESENSA in all versions, the confidentiality impact is considered low because user credentials are not shown in the web interface.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch Praesideo Firmware | <=4.41 | |
Bosch PRAESIDEO | ||
Bosch Praesensa Firmware | <=1.10 | |
Bosch PRAESENSA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6776 is a vulnerability in the web-based management interface of Bosch PRAESIDEO and Bosch PRAESENSA, which allows an unauthenticated remote attacker to trigger actions on an affected system on behalf of another user through Cross-Site Request Forgery.
CVE-2020-6776 has a severity value of 8.8, which is categorized as high.
CVE-2020-6776 affects Bosch PRAESIDEO firmware versions up to and including 4.41, and Bosch PRAESENSA firmware versions up to and including 1.10.
An unauthenticated remote attacker can exploit CVE-2020-6776 through Cross-Site Request Forgery, allowing them to perform actions on an affected system on behalf of another user.
Bosch PRAESIDEO and Bosch PRAESENSA are not vulnerable to CVE-2020-6776, but their firmware versions up to and including 4.41 and 1.10 respectively are affected.