CVE-2019-11684
CVSS V2 High 10
CVSS V3 Critical 9.8
Description
Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 < v3.71.0034 and v3.81 < 3.81.0050; DIVAR IP 5000 3.80 < 3.80.0039; BVMS all versions using VRM.
Overview
- CVE ID
- CVE-2019-11684
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2021-02-26T16:15:12
- Last Modified Date
- 2021-07-21T11:39:23
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:* | 1 | OR | 3.70 | 3.71.0034 |
cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:* | 1 | OR | 3.81 | 3.81.0050 |
AND | ||||
cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.80 | 3.80.0039 |
cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:a:bosch:video_management_system:3.70.0056:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:bosch:video_management_system:3.70.0058:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:bosch:video_management_system:3.70.0060:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:bosch:video_management_system:3.70.0062:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:bosch:video_management_system:3.71.0022:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:bosch:video_management_system:3.71.0029:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:bosch:video_management_system:3.71.0031:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:bosch:video_management_system:3.71.0032:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:bosch:video_management_system:3.81.0032:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:bosch:video_management_system:3.81.0038:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:bosch:video_management_system:3.81.0048:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 10
- Severity
- HIGH
- Exploitability Score
- 10
- Impact Score
- 10
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 9.8
- Base Severity
- CRITICAL
- Exploitability Score
- 3.9
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://psirt.bosch.com/security-advisories/bosch-sa-804652.html | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2019-11684 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11684 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 16:09:16 | Added to TrackCVE | |||
2022-12-05 22:52:45 | 2021-02-26T16:15Z | 2021-02-26T16:15:12 | CVE Published Date | updated |
2022-12-05 22:52:45 | 2021-07-21T11:39:23 | CVE Modified Date | updated | |
2022-12-05 22:52:45 | Analyzed | Vulnerability Status | updated |