ID

VAR-202002-1207


CVE

CVE-2020-6767


TITLE

Bosch Video Management System path traversal vulnerability

Trust: 1.2

sources: CNVD: CNVD-2020-18524 // CNNVD: CNNVD-202002-173

DESCRIPTION

A path traversal vulnerability in the Bosch Video Management System (BVMS) FileTransferService allows an authenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed. plural Bosch The product contains a past traversal vulnerability.Information may be obtained. Bosch DIVAR IP 3000 is a 3000 series video recorder from the German company Bosch (Bosch). The vulnerability stems from a network system or product failing to properly filter resources or special elements in the file path. An attacker can use this vulnerability to access a location outside the restricted directory

Trust: 2.25

sources: NVD: CVE-2020-6767 // JVNDB: JVNDB-2020-001980 // CNVD: CNVD-2020-18524 // VULMON: CVE-2020-6767

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-18524

AFFECTED PRODUCTS

vendor:boschmodel:video management system viewerscope:gteversion:8.0

Trust: 1.0

vendor:boschmodel:video management system viewerscope:lteversion:8.0.329

Trust: 1.0

vendor:boschmodel:video management systemscope:lteversion:9.0.0.827

Trust: 1.0

vendor:boschmodel:video management systemscope:gteversion:9.0

Trust: 1.0

vendor:boschmodel:video management systemscope:lteversion:8.0.0.329

Trust: 1.0

vendor:boschmodel:video management system viewerscope:lteversion:9.0.0.827

Trust: 1.0

vendor:boschmodel:video management system viewerscope:gteversion:9.0

Trust: 1.0

vendor:boschmodel:video management systemscope:lteversion:7.5

Trust: 1.0

vendor:boschmodel:video management systemscope:gteversion:10.0

Trust: 1.0

vendor:boschmodel:video management systemscope:lteversion:10.0.0.1225

Trust: 1.0

vendor:boschmodel:video management system viewerscope:lteversion:10.0.0.1225

Trust: 1.0

vendor:boschmodel:video management system viewerscope:gteversion:10.0

Trust: 1.0

vendor:boschmodel:video management systemscope:gteversion:8.0

Trust: 1.0

vendor:boschmodel:video management system viewerscope:lteversion:7.5

Trust: 1.0

vendor:robert boschmodel:bvms viewerscope: - version: -

Trust: 0.8

vendor:robert boschmodel:video recording managerscope: - version: -

Trust: 0.8

vendor:boschmodel:divar ipscope:eqversion:3000

Trust: 0.6

vendor:boschmodel:bvmsscope:gteversion:10.0,<=10.0.0.1225

Trust: 0.6

vendor:boschmodel:bvmsscope:gteversion:9.0,<=9.0.0.827

Trust: 0.6

vendor:boschmodel:bvmsscope:gteversion:8.0,<=8.0.329

Trust: 0.6

vendor:boschmodel:bvmsscope:lteversion:<=7.5

Trust: 0.6

vendor:boschmodel:bvms viewerscope:gteversion:10.0,<=10.0.0.1225

Trust: 0.6

vendor:boschmodel:bvms viewerscope:gteversion:9.0,<=9.0.0.827

Trust: 0.6

vendor:boschmodel:bvms viewerscope:gteversion:8.0,<=8.0.329

Trust: 0.6

vendor:boschmodel:bvms viewerscope:lteversion:<=7.5

Trust: 0.6

vendor:boschmodel:divar ipscope:eqversion:7000

Trust: 0.6

vendor:boschmodel:divar ip all-in-onescope:eqversion:5000

Trust: 0.6

vendor:boschmodel:divar ip 3000scope:eqversion: -

Trust: 0.6

vendor:boschmodel:divar ip all-in-one 5000scope:eqversion: -

Trust: 0.6

vendor:boschmodel:divar ip 7000scope:eqversion: -

Trust: 0.6

sources: CNVD: CNVD-2020-18524 // JVNDB: JVNDB-2020-001980 // CNNVD: CNNVD-202002-173 // NVD: CVE-2020-6767

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-6767
value: MEDIUM

Trust: 1.0

psirt@bosch.com: CVE-2020-6767
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-001980
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-18524
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202002-173
value: MEDIUM

Trust: 0.6

VULMON: CVE-2020-6767
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-6767
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-001980
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-18524
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-6767
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

psirt@bosch.com: CVE-2020-6767
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.1
impactScore: 4.0
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-001980
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-18524 // VULMON: CVE-2020-6767 // JVNDB: JVNDB-2020-001980 // CNNVD: CNNVD-202002-173 // NVD: CVE-2020-6767 // NVD: CVE-2020-6767

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

sources: JVNDB: JVNDB-2020-001980 // NVD: CVE-2020-6767

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202002-173

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202002-173

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-001980

PATCH

title:BOSCH-SA-381489-BTurl:https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-sa-381489-bt_cve-2020-6767_securityadvisory_bvms_pathtraversal.pdf

Trust: 0.8

title:Patch for Bosch Video Management System path traversal vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/209977

Trust: 0.6

title:Bosch Video Management System Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=109374

Trust: 0.6

sources: CNVD: CNVD-2020-18524 // JVNDB: JVNDB-2020-001980 // CNNVD: CNNVD-202002-173

EXTERNAL IDS

db:NVDid:CVE-2020-6767

Trust: 3.1

db:JVNDBid:JVNDB-2020-001980

Trust: 0.8

db:CNVDid:CNVD-2020-18524

Trust: 0.6

db:CNNVDid:CNNVD-202002-173

Trust: 0.6

db:VULMONid:CVE-2020-6767

Trust: 0.1

sources: CNVD: CNVD-2020-18524 // VULMON: CVE-2020-6767 // JVNDB: JVNDB-2020-001980 // CNNVD: CNNVD-202002-173 // NVD: CVE-2020-6767

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-6767

Trust: 2.0

url:https://psirt.bosch.com/security-advisories/bosch-sa-381489-bt.html

Trust: 1.7

url:https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-sa-381489-bt_cve-2020-6767_securityadvisory_bvms_pathtraversal.pdf

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6767

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/22.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2020-18524 // VULMON: CVE-2020-6767 // JVNDB: JVNDB-2020-001980 // CNNVD: CNNVD-202002-173 // NVD: CVE-2020-6767

SOURCES

db:CNVDid:CNVD-2020-18524
db:VULMONid:CVE-2020-6767
db:JVNDBid:JVNDB-2020-001980
db:CNNVDid:CNNVD-202002-173
db:NVDid:CVE-2020-6767

LAST UPDATE DATE

2024-11-23T23:04:28.416000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-18524date:2020-03-21T00:00:00
db:VULMONid:CVE-2020-6767date:2020-02-14T00:00:00
db:JVNDBid:JVNDB-2020-001980date:2020-03-02T00:00:00
db:CNNVDid:CNNVD-202002-173date:2020-02-19T00:00:00
db:NVDid:CVE-2020-6767date:2024-11-21T05:36:09.480

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-18524date:2020-03-20T00:00:00
db:VULMONid:CVE-2020-6767date:2020-02-06T00:00:00
db:JVNDBid:JVNDB-2020-001980date:2020-03-02T00:00:00
db:CNNVDid:CNNVD-202002-173date:2020-02-06T00:00:00
db:NVDid:CVE-2020-6767date:2020-02-06T17:15:14.130