A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The RCP+ network port allows access without authentication. Adding authentication feature to the respective library fixes the issue. The issue is classified as "CWE-284: Improper Access Control." This vulnerability, for example, allows a potential attacker to delete video or read video data.

Project Subscriptions

Vendors Products
Access Easy Controller Subscribe
Access Easy Controller Firmware Subscribe
Access Professional Edition Subscribe
Bosch Video Client Subscribe
Bosch Video Management System Subscribe
Building Integration System Subscribe
Configuration Manager Subscribe
Dip 2000 Subscribe
Dip 2000 Firmware Subscribe
Dip 3000 Subscribe
Dip 3000 Firmware Subscribe
Dip 5000 Subscribe
Dip 5000 Firmware Subscribe
Dip 7000 Subscribe
Dip 7000 Firmware Subscribe
Video Sdk Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-16512 A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The RCP+ network port allows access without authentication. Adding authentication feature to the respective library fixes the issue. The issue is classified as "CWE-284: Improper Access Control." This vulnerability, for example, allows a potential attacker to delete video or read video data.
Fixes

Solution

The recommended approach is to update the software to a fixed version as soon as possible. Until a fixed software version is installed, the mitigation approaches firewalling, and IP filtering can be utilized. For further informatation please check the published security advisory.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-09-17T00:46:00.474Z

Reserved: 2019-01-25T00:00:00

Link: CVE-2019-6958

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-29T19:29:00.703

Modified: 2024-11-21T04:47:18.280

Link: CVE-2019-6958

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses