First published: Tue Jan 09 2024(Updated: )
Network port 8899 open in WiFi firmware of BCC101/BCC102/BCC50 products, that allows an attacker to connect to the device via same WiFi network.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Bosch Bcc101 | >=4.13.20<4.13.33 | |
Bosch Bcc101 Firmware | ||
All of | ||
Bosch Bcc102 | >=4.13.20<4.13.33 | |
Bosch Bcc102 Firmware | ||
All of | ||
Bosch Bcc50 Firmware | >=4.13.20<4.13.33 | |
Bosch Bcc50 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49722 is classified as a high-severity vulnerability due to the potential for unauthorized access to the device over an open network port.
To remediate CVE-2023-49722, update the firmware of BCC101, BCC102, or BCC50 products to the latest version beyond 4.13.33.
CVE-2023-49722 affects Bosch BCC101, BCC102, and BCC50 devices running specific firmware versions between 4.13.20 and 4.13.33.
CVE-2023-49722 allows an attacker on the same WiFi network to connect to the affected Bosch devices through the open port 8899.
CVE-2023-49722 was reported within the security advisory published by Bosch, detailing the vulnerability and its implications.