First published: Thu Jan 14 2021(Updated: )
A vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an authenticated remote attacker with admin privileges to mount a stored Cross-Site-Scripting (XSS) attack against another user. When the victim logs into the management interface, the stored script code is executed in the context of his browser. A successful exploit would allow an attacker to interact with the management interface with the privileges of the victim. However, as the attacker already needs admin privileges, there is no additional impact on the management interface itself.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch Praesideo Firmware | <=4.41 | |
Bosch PRAESIDEO | ||
Bosch Praesensa Firmware | <=1.10 | |
Bosch PRAESENSA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-6777.
The severity of CVE-2020-6777 is medium with a CVSS score of 4.8.
Bosch PRAESIDEO up to and including version 4.41 and Bosch PRAESENSA up to and including version 1.10 are affected by CVE-2020-6777.
An attacker with admin privileges can mount a stored Cross-Site-Scripting (XSS) attack against another user through the web-based management interface of Bosch PRAESIDEO and Bosch PRAESENSA.
No, Bosch PRAESIDEO and Bosch PRAESENSA are not vulnerable to CVE-2020-6777.
To fix CVE-2020-6777, update Bosch PRAESIDEO firmware to version 4.42 or later, and update Bosch PRAESENSA firmware to version 1.11 or later.