First published: Wed Jun 09 2021(Updated: )
In Bosch IP cameras, improper validation of the HTTP header allows an attacker to inject arbitrary HTTP headers through crafted URLs.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch Cpp4 Firmware | ||
Bosch Cpp4 | ||
Bosch Cpp6 Firmware | ||
Bosch Cpp6 | ||
Bosch Cpp7 Firmware | ||
Bosch Cpp7 | ||
Bosch Cpp7.3 Firmware | ||
Bosch Cpp7.3 | ||
Bosch Cpp13 Firmware | ||
Bosch Cpp13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-23853.
The severity of CVE-2021-23853 is critical with a CVSS score of 9.8.
The affected software includes Bosch IP cameras with Cpp4, Cpp6, Cpp7, Cpp7.3, and Cpp13 firmware.
The vulnerability in Bosch IP cameras occurs due to improper validation of the HTTP header, allowing an attacker to inject arbitrary HTTP headers through crafted URLs.
To fix the vulnerability in Bosch IP cameras, it is recommended to apply the security patch provided by Bosch. Please refer to the official Bosch Security Advisory for more information.