CVE-2019-8952
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
13/05/2019
Last modified:
16/05/2019
Description
A Path Traversal vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote authorized user to access arbitrary files on the system via the network interface. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; 3.70; 3.71 before 3.71.0032 ; fixed versions: 3.71.0032; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; 3.70.0056; fixed versions: 7.5; 3.71.0032).
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:bosch:divar_ip_2000_firmware:*:*:*:*:*:*:*:* | 3.62.0019 (excluding) | |
| cpe:2.3:h:bosch:divar_ip_2000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:* | 3.80.0033 (excluding) | |
| cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:* | 3.71.0032 (excluding) | |
| cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:* | 3.71.0032 (excluding) | |
| cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:* | 3.81 (including) | 3.81.0032 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://media.boschsecurity.com/fs/media/pb/security_advisories/bosch-2019-0402bt-cve-2019-8952_security_advisory_vrm_path_traversal.pdf
- https://psirt.bosch.com
- https://psirt.bosch.com/Advisory/BOSCH-2019-0402.html
- https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html



