ID

VAR-202306-1304


CVE

CVE-2023-28175


TITLE

plural  Robert Bosch GmbH  Fraudulent Authentication Vulnerability in Products

Trust: 0.8

sources: JVNDB: JVNDB-2023-014290

DESCRIPTION

Improper Authorization in SSH server in Bosch VMS 11.0, 11.1.0, and 11.1.1 allows a remote authenticated user to access resources within the trusted internal network via a port forwarding request. Bosch Video Management System (BVMS) , Bosch BVMS Viewer , divar ip 3000 firmware etc. Robert Bosch GmbH The product contains an incorrect authentication vulnerability.Information may be obtained

Trust: 1.71

sources: NVD: CVE-2023-28175 // JVNDB: JVNDB-2023-014290 // VULMON: CVE-2023-28175

AFFECTED PRODUCTS

vendor:boschmodel:video management system viewerscope:gteversion:7.5

Trust: 1.0

vendor:boschmodel:divar ip 7000scope:lteversion:8.0

Trust: 1.0

vendor:boschmodel:divar ip 7000 r3scope:lteversion:11.1.1

Trust: 1.0

vendor:boschmodel:divar ip 3000scope:lteversion:8.0

Trust: 1.0

vendor:boschmodel:divar ip 5000scope:lteversion:11.1.1

Trust: 1.0

vendor:boschmodel:divar ip 3000scope:gteversion:7.5

Trust: 1.0

vendor:boschmodel:divar ip 7000 r2scope:gteversion:7.5

Trust: 1.0

vendor:boschmodel:divar ip 7000scope:gteversion:7.5

Trust: 1.0

vendor:boschmodel:video management systemscope:lteversion:11.1.1

Trust: 1.0

vendor:boschmodel:video management system viewerscope:lteversion:11.1.1

Trust: 1.0

vendor:boschmodel:divar ip 7000 r3scope:gteversion:10.1.1

Trust: 1.0

vendor:boschmodel:divar ip 6000scope:eqversion:11.1.1

Trust: 1.0

vendor:boschmodel:divar ip 7000 r2scope:lteversion:11.1.1

Trust: 1.0

vendor:boschmodel:divar ip 5000scope:gteversion:9.0

Trust: 1.0

vendor:boschmodel:video management systemscope:gteversion:7.5

Trust: 1.0

vendor:boschmodel:divar ip 4000scope:eqversion:11.1.1

Trust: 1.0

vendor:robert boschmodel:video management systemscope: - version: -

Trust: 0.8

vendor:robert boschmodel:divar ip 7000scope: - version: -

Trust: 0.8

vendor:robert boschmodel:divar ip 6000scope: - version: -

Trust: 0.8

vendor:robert boschmodel:bvms viewerscope: - version: -

Trust: 0.8

vendor:robert boschmodel:divar ip 4000scope: - version: -

Trust: 0.8

vendor:robert boschmodel:divar ip 3000scope: - version: -

Trust: 0.8

vendor:robert boschmodel:divar ip 7000 r3scope: - version: -

Trust: 0.8

vendor:robert boschmodel:divar ip 7000 r2scope: - version: -

Trust: 0.8

vendor:robert boschmodel:divar ip 5000scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-014290 // NVD: CVE-2023-28175

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-28175
value: HIGH

Trust: 1.0

psirt@bosch.com: CVE-2023-28175
value: HIGH

Trust: 1.0

NVD: CVE-2023-28175
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202306-1186
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2023-28175
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.1
impactScore: 4.0
version: 3.1

Trust: 1.0

psirt@bosch.com: CVE-2023-28175
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 4.7
version: 3.1

Trust: 1.0

NVD: CVE-2023-28175
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-014290 // CNNVD: CNNVD-202306-1186 // NVD: CVE-2023-28175 // NVD: CVE-2023-28175

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.0

problemtype:CWE-863

Trust: 1.0

problemtype:Illegal authentication (CWE-863) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-014290 // NVD: CVE-2023-28175

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202306-1186

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202306-1186

PATCH

title:Bosch Video Management System Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=244463

Trust: 0.6

sources: CNNVD: CNNVD-202306-1186

EXTERNAL IDS

db:NVDid:CVE-2023-28175

Trust: 3.3

db:JVNDBid:JVNDB-2023-014290

Trust: 0.8

db:CNNVDid:CNNVD-202306-1186

Trust: 0.6

db:VULMONid:CVE-2023-28175

Trust: 0.1

sources: VULMON: CVE-2023-28175 // JVNDB: JVNDB-2023-014290 // CNNVD: CNNVD-202306-1186 // NVD: CVE-2023-28175

REFERENCES

url:https://psirt.bosch.com/security-advisories/bosch-sa-025794-bt.html

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2023-28175

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2023-28175/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-28175 // JVNDB: JVNDB-2023-014290 // CNNVD: CNNVD-202306-1186 // NVD: CVE-2023-28175

SOURCES

db:VULMONid:CVE-2023-28175
db:JVNDBid:JVNDB-2023-014290
db:CNNVDid:CNNVD-202306-1186
db:NVDid:CVE-2023-28175

LAST UPDATE DATE

2024-08-14T14:01:47.179000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-28175date:2023-06-15T00:00:00
db:JVNDBid:JVNDB-2023-014290date:2023-12-22T08:15:00
db:CNNVDid:CNNVD-202306-1186date:2023-07-06T00:00:00
db:NVDid:CVE-2023-28175date:2023-07-05T13:25:06.167

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-28175date:2023-06-15T00:00:00
db:JVNDBid:JVNDB-2023-014290date:2023-12-22T00:00:00
db:CNNVDid:CNNVD-202306-1186date:2023-06-15T00:00:00
db:NVDid:CVE-2023-28175date:2023-06-15T11:15:09.227