First published: Wed Dec 08 2021(Updated: )
A crafted configuration packet sent by an authenticated administrative user can be used to execute arbitrary commands in system context. This issue also affects installations of the VRM, DIVAR IP, BVMS with VRM installed, the VIDEOJET decoder (VJD-7513 and VJD-8000).
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch Bosch Video Management System | <=9.0 | |
Bosch Bosch Video Management System | >=10.0<10.0.2 | |
Bosch Bosch Video Management System | =10.1 | |
Bosch Bosch Video Management System | =11.0 | |
Bosch Video Recording Manager | <=3.81 | |
Bosch Video Recording Manager | >=3.82<=3.82.0057 | |
Bosch Video Recording Manager | >=3.83<=3.83.0021 | |
Bosch Video Recording Manager | >=4.0<=4.00.0070 | |
Bosch Divar Ip 5000 Firmware | ||
Bosch Divar Ip 7000 Firmware | ||
Bosch Videojet Decoder 7513 Firmware | <=10.22.0038 | |
Bosch Videojet Decoder 7513 | ||
Bosch Videojet Decoder 8000 Firmware | <=10.01.0036 | |
Bosch Videojet Decoder 8000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23862 is a vulnerability that allows an authenticated administrative user to execute arbitrary commands in system context by sending a crafted configuration packet.
CVE-2021-23862 affects installations of Bosch Video Management System (versions up to 10.0.2), Bosch Video Recording Manager (versions up to 4.00.0070), and VIDEOJET decoder (VJD-7513 and VJD-8000).
CVE-2021-23862 has a severity rating of 7.2, which is considered critical.
To fix CVE-2021-23862, upgrade to a version of Bosch Video Management System, Bosch Video Recording Manager, or VIDEOJET decoder that is not vulnerable. Refer to the vendor's security advisory for more information.
You can find more information about CVE-2021-23862 in Bosch's security advisory at the following URL: https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html