Wiz Agents & Workflows are here

CVE-2021-23842
Bosch Building Integration System (BIS) vulnerability analysis and mitigation

Overview

The Bosch AMC2 (Access Modular Controller) vulnerability (CVE-2021-23842) was disclosed on January 19, 2022. This vulnerability affects multiple Bosch products including Building Integration System (BIS), Access Management System (AMS), Access Professional Edition (APE), and Access Modular Controller (AMC2). The vulnerability involves the communication to the AMC2 using the Blowfish cryptographic algorithm for symmetric encryption (Bosch Advisory).

Technical details

The vulnerability is classified as CWE-321 (Use of Hard-coded Cryptographic Key) with a CVSS v3.1 Base Score of 5.7 (Medium). The attack vector is Adjacent Network, requiring low complexity and no privileges, but user interaction is required. The vulnerability stems from the implementation of the Blowfish cryptographic algorithm where an attacker could retrieve the encryption key from the firmware (Bosch Advisory).

Impact

An attacker can exploit this vulnerability to decrypt and modify network traffic between the AMC2 and the host system, decrypt and investigate the device's firmware file, and alter the device configuration. The impact is primarily focused on confidentiality, with the ability to compromise sensitive communication data (Bosch Advisory).

Mitigation and workarounds

Bosch recommends updating to BIS 4.9.1 and AMS 4.0, which are immune to this vulnerability. These updates implement DTLS communication and include strengthened firmware for AMC2 controllers. For systems that cannot be immediately updated, Bosch has prepared patches that distribute hardened firmware to the AMC2 door controllers. Additionally, it is recommended to follow general IT hardening guidelines and operate access control in a secured local area network (Bosch Advisory).

Additional resources


SourceThis report was generated using AI

Related Bosch Building Integration System (BIS) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2021-23843HIGH7.8
  • Bosch Building Integration System (BIS)Bosch Building Integration System (BIS)
  • cpe:2.3:a:bosch:building_integration_system
NoYesJan 19, 2022
CVE-2021-23859HIGH7.5
  • Bosch Video Recording Manager (VRM)Bosch Video Recording Manager (VRM)
  • cpe:2.3:a:bosch:video_recording_manager
NoYesDec 08, 2021
CVE-2023-29241HIGH7.1
  • Bosch Building Integration System (BIS)Bosch Building Integration System (BIS)
  • cpe:2.3:a:bosch:building_integration_system
NoYesJun 30, 2023
CVE-2021-23842HIGH7.1
  • Bosch Building Integration System (BIS)Bosch Building Integration System (BIS)
  • cpe:2.3:a:bosch:building_integration_system
NoYesJan 19, 2022
CVE-2023-32228MEDIUM4.6
  • Bosch Building Integration System (BIS)Bosch Building Integration System (BIS)
  • cpe:2.3:a:bosch:building_integration_system
NoNoApr 11, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management