CVE-2023-28175
Bosch Video Management System (BVMS) vulnerability analysis and mitigation

Overview

The vulnerability (CVE-2023-28175) affects the SSH server in Bosch Video Management System (VMS) versions 11.0, 11.1.0, and 11.1.1. This security flaw allows a remote authenticated user to access resources within the trusted internal network through port forwarding requests. The vulnerability was discovered and disclosed in May 2023, affecting multiple Bosch VMS products including BVMS, BVMS Viewer, and various DIVAR IP models (Bosch Advisory).

Technical details

The vulnerability is classified as an Improper Authorization issue (CWE-863) and Exposure of Sensitive Information to an Unauthorized Actor (CWE-200). It received a CVSS v3.1 Base Score of 7.1 (High) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N. The technical issue lies in the SSH server's failure to restrict port forwarding requests from authenticated SSH clients, potentially allowing access to resources beyond the scope of the Bosch Video Management System (Bosch Advisory, NVD).

Impact

The vulnerability enables authenticated users to access resources within the trusted internal network that are normally protected from the WAN interface. This access could extend beyond the scope of the Bosch Video Management System, potentially compromising the security of the internal network infrastructure (Bosch Advisory).

Mitigation and workarounds

Bosch has released security patches for affected versions. For version 11.1.1, users should apply patch BVMS111165PatchSecurityOCmaxSSHbandwidth405734,393949,393486.zip. Version 11.0 users should install BVMS11001025PatchSecuritySSHOCcrash405734,393486,339917,336777.zip. Additionally, network administrators are advised to segment and segregate networks, harden BVMS SSH hosts by disabling unnecessary services, monitor network activity, and validate hardware integrity (Bosch Advisory).

Additional resources


SourceThis report was generated using AI

Related Bosch Video Management System (BVMS) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2019-11684CRITICAL9.8
  • Bosch Video Recording Manager (VRM)Bosch Video Recording Manager (VRM)
  • cpe:2.3:a:bosch:video_management_system
NoYesFeb 26, 2021
CVE-2020-6785HIGH7.8
  • Bosch Video Management System (BVMS)Bosch Video Management System (BVMS)
  • cpe:2.3:a:bosch:video_management_system
NoYesMar 25, 2021
CVE-2023-28175HIGH7.7
  • Bosch Video Management System (BVMS)Bosch Video Management System (BVMS)
  • cpe:2.3:a:bosch:video_management_system
NoNoJun 15, 2023
CVE-2020-6768HIGH7.5
  • Bosch Video Management System (BVMS)Bosch Video Management System (BVMS)
  • cpe:2.3:a:bosch:video_management_system
NoYesFeb 07, 2020
CVE-2020-6767MEDIUM6.5
  • Bosch Video Management System (BVMS)Bosch Video Management System (BVMS)
  • cpe:2.3:a:bosch:video_management_system
NoYesFeb 06, 2020

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management