First published: Fri May 28 2021(Updated: )
When using http protocol, the user password is transmitted as a clear text parameter for which it is possible to be obtained by an attacker through a MITM attack. This will be fixed starting from Firmware version 3.11.5, which will be released on the 30th of June, 2021.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch B426 Firmware | =03.01.0004 | |
Bosch B426 Firmware | =03.02.002 | |
Bosch B426 Firmware | =03.03.0009 | |
Bosch B426 Firmware | =03.05.0003 | |
Bosch B426 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23846 is a vulnerability that allows an attacker to obtain the user's password when using the HTTP protocol.
CVE-2021-23846 has a severity rating of 5.9 (high).
Versions 03.01.0004, 03.02.002, 03.03.0009, and 03.05.0003 of Bosch B426 Firmware are affected by CVE-2021-23846.
The vulnerability will be fixed in Firmware version 3.11.5, which will be released on June 30, 2021.
You can find more information about CVE-2021-23846 at the following reference: [link](https://psirt.bosch.com/security-advisories/bosch-sa-196933-bt.html).