CVE-2018-19036

CVSS V2 High 10 CVSS V3 Critical 9.8
Description
An issue was discovered in several Bosch IP cameras for firmware versions 6.32 and higher. A malicious client could potentially succeed in the unauthorized execution of code on the device via the network interface.
Overview
  • CVE ID
  • CVE-2018-19036
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2018-12-17T19:29:00
  • Last Modified Date
  • 2019-02-22T19:04:36
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:bosch:common_product_platform_4_firmware:*:*:*:*:*:*:*:* 1 OR 6.32
cpe:2.3:h:bosch:autodome_ip_4000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:autodome_ip_5000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:autodome_ip_5000_ir:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:autodome_ip_7000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_hd_1080p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_hd_1080p_hdr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_hd_720p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_imager_9000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_4000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_5000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_5000_mp:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_bullet_4000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_bullet_5000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_starlight_7000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:extegra_ip_dynamic_9000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:extegra_ip_starlight_9000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_corner_9000_mp:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_hd_1080p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_hd_1080p_hdr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_hd_720p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_indoor_4000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_indoor_4000_ir:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_indoor_5000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_indoor_5000_mp:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_micro_2000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_micro_2000_ip:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_micro_5000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_micro_5000_mp:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_outdoor_4000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_outdoor_4000_ir:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_outdoor_5000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_outdoor_5000_mp:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_panormic_5000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:ip_2000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:ip_2000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:ip_bullet_4000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:ip_bullet_5000_hd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:mic_ip_dynamic_7000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:mic_ip_starlight_7000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:tinyon_ip_2000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:vandal-proof_flexidome_hd_1080p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:vandal-proof_flexidome_hd_1080p_hdr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:vandal-proof_flexidome_hd_720p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:bosch:common_product_platform_6_firmware:*:*:*:*:*:*:*:* 1 OR 6.32
cpe:2.3:h:bosch:aviotec_ip_starlight_8000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_starlight_8000_12mp:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_ultra_8000_12mp:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_panoramic_6000_12mp_180:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_panoramic_6000_12mp_180_iva:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_panoramic_6000_12mp_360:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_panoramic_6000_12mp_360_iva:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_panoramic_7000_12mp_180:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_panoramic_7000_12mp_180_iva:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_panoramic_7000_12mp_360:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_panoramic_7000_12mp_360_iva:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:bosch:common_product_platform_7_firmware:*:*:*:*:*:*:*:* 1 OR 6.32
cpe:2.3:h:bosch:dinion_ip_starlight_6000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_starlight_7000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_thermal_8000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_starlight_6000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_starlight_7000:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:bosch:common_product_platform_7.3_firmware:*:*:*:*:*:*:*:* 1 OR 6.32
cpe:2.3:h:bosch:autodome_ip_4000i:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:autodome_ip_5000i:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:autodome_ip_starlight_5000i:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:autodome_ip_starlight_7000i:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_bullet_4000i:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_bullet_5000i:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:dinion_ip_bullet_6000i:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_4000i:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:flexidome_ip_5000i:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:mic_ip_fusion_9000i:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:bosch:mic_ip_starlight_7000i:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 10
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
History
Created Old Value New Value Data Type Notes
2022-05-10 07:58:19 Added to TrackCVE
2022-12-03 15:26:52 2018-12-17T19:29Z 2018-12-17T19:29:00 CVE Published Date updated
2022-12-03 15:26:52 2019-02-22T19:04:36 CVE Modified Date updated
2022-12-03 15:26:52 Analyzed Vulnerability Status updated