First published: Wed Jan 10 2024(Updated: )
The vulnerability allows a remote attacker to inject arbitrary HTTP response headers or manipulate HTTP response bodies inside a victim’s session via a crafted URL or HTTP request.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Bosch Nexo-os | >=1000<=1500-sp2 | |
Any of | ||
Bosch Nexo Cordless Nutrunner Nxa011s-36v-b (0608842012) | ||
Bosch Nexo Cordless Nutrunner Nxa011s-36v | ||
Bosch Nexo Cordless Nutrunner Nxa015s-36v-b | ||
Bosch Nexo Cordless Nutrunner Nxa015s-36v | ||
Bosch Nexo Cordless Nutrunner Nxa030s-36v-b (0608842007) | ||
Bosch Nexo Cordless Nutrunner Nxa030s-36v | ||
Bosch Nexo Cordless Nutrunner Nxa050s-36v-b | ||
Bosch Nexo Cordless Nutrunner Nxa050s-36v | ||
Bosch Nexo Cordless Nutrunner Nxa065s-36v-b | ||
Bosch Nexo Cordless Nutrunner Nxa065s-36v | ||
Bosch Nexo Cordless Nutrunner Nxp012qd-36v-b | ||
Bosch Nexo Cordless Nutrunner Nxp012qd-36v | ||
Bosch Nexo Cordless Nutrunner Nxv012t-36v-b | ||
Bosch Nexo Cordless Nutrunner Nxv012t-36v (0608842015) | ||
Bosch Nexo Special Cordless Nutrunner | ||
Bosch Nexo Special Cordless Nutrunner | ||
Bosch Nexo Special Cordless Nutrunner | ||
Bosch Nexo Special Cordless Nutrunner | ||
Bosch Nexo Special Cordless Nutrunner (0608pe2666) | ||
Bosch Nexo Special Cordless Nutrunner |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-48256 is currently classified as critical due to its potential to allow unauthorized access and manipulation of HTTP responses.
To fix CVE-2023-48256, update the affected Bosch Nexo OS software to the latest version that addresses this vulnerability.
CVE-2023-48256 allows remote attackers to inject arbitrary HTTP response headers, potentially leading to session hijacking or data manipulation.
CVE-2023-48256 affects Bosch Nexo OS versions from 1000 to 1500-sp2, but most specific cordless nutrunner models are not vulnerable.
Yes, CVE-2023-48256 can be exploited remotely through crafted URLs or HTTP requests that target the vulnerable software.