First published: Wed Jan 19 2022(Updated: )
The Bosch software tools AccessIPConfig.exe and AmcIpConfig.exe are used to configure certains settings in AMC2 devices. The tool allows putting a password protection on configured devices to restrict access to the configuration of an AMC2. An attacker can circumvent this protection and make unauthorized changes to configuration data on the device. An attacker can exploit this vulnerability to manipulate the device\'s configuration or make it unresponsive in the local network. The attacker needs to have access to the local network, typically even the same subnet.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch Amc2 Firmware | ||
Bosch Amc2 | ||
Bosch Access Management System | =3.0 | |
Bosch Access Professional Edition | <=3.8.0 | |
Bosch Building Integration System | <4.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-23843.
The severity of CVE-2021-23843 is high, with a severity value of 7.8.
The Bosch software tools AccessIPConfig.exe and AmcIpConfig.exe are affected by CVE-2021-23843.
An attacker can exploit CVE-2021-23843 by circumventing the password protection on configured devices to gain unauthorized access to the configuration of an AMC2.
To fix CVE-2021-23843, it is recommended to apply the patches or updates provided by Bosch. Additionally, ensure that strong passwords are used to protect configured devices.