CVE-2019-6957
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
29/05/2019
Last modified:
30/11/2022
Description
A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Video Recording Manager (VRM), Video Streaming Gateway (VSG), Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The vulnerability potentially allows the unauthorized execution of code in the system via the network interface.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:bosch:access_professional_edition:*:*:*:*:*:*:*:* | 3.0 (including) | 3.7 (including) |
| cpe:2.3:a:bosch:bosch_video_client:*:*:*:*:*:*:*:* | 1.7.6.079 (excluding) | |
| cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:* | 9.0 (including) | |
| cpe:2.3:a:bosch:building_integration_system:*:*:*:*:*:*:*:* | 2.2 (including) | 4.4 (including) |
| cpe:2.3:a:bosch:building_integration_system:4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bosch:building_integration_system:4.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bosch:building_integration_system:4.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bosch:configuration_manager:*:*:*:*:*:*:*:* | 6.10 (excluding) | |
| cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:* | 3.71.0032 (excluding) | |
| cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:* | 3.81 (including) | 3.81.0048 (excluding) |
| cpe:2.3:a:bosch:video_sdk:*:*:*:*:*:*:*:* | 6.32.0099 (excluding) | |
| cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:* | 6.43.0023 (excluding) | |
| cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:* | 6.45 (including) | 6.45.0008 (excluding) |
| cpe:2.3:o:bosch:dip_2000_firmware:*:*:*:*:*:*:*:* | 0380.037 (excluding) | |
| cpe:2.3:h:bosch:dip_2000:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



