A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The RCP+ network port allows access without authentication. Adding authentication feature to the respective library fixes the issue. The issue is classified as "CWE-284: Improper Access Control." This vulnerability, for example, allows a potential attacker to delete video or read video data.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Bosch
Subscribe
|
Access Easy Controller
Subscribe
Access Easy Controller Firmware
Subscribe
Access Professional Edition
Subscribe
Bosch Video Client
Subscribe
Bosch Video Management System
Subscribe
Building Integration System
Subscribe
Configuration Manager
Subscribe
Dip 2000
Subscribe
Dip 2000 Firmware
Subscribe
Dip 3000
Subscribe
Dip 3000 Firmware
Subscribe
Dip 5000
Subscribe
Dip 5000 Firmware
Subscribe
Dip 7000
Subscribe
Dip 7000 Firmware
Subscribe
Video Sdk
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-16512 | A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The RCP+ network port allows access without authentication. Adding authentication feature to the respective library fixes the issue. The issue is classified as "CWE-284: Improper Access Control." This vulnerability, for example, allows a potential attacker to delete video or read video data. |
Fixes
Solution
The recommended approach is to update the software to a fixed version as soon as possible. Until a fixed software version is installed, the mitigation approaches firewalling, and IP filtering can be utilized. For further informatation please check the published security advisory.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T00:46:00.474Z
Reserved: 2019-01-25T00:00:00
Link: CVE-2019-6958
No data.
Status : Modified
Published: 2019-05-29T19:29:00.703
Modified: 2024-11-21T04:47:18.280
Link: CVE-2019-6958
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD