SB2024031341 - Multiple vulnerabilities in Bosch Remote Programing Software



SB2024031341 - Multiple vulnerabilities in Bosch Remote Programing Software

Published: March 13, 2024

Security Bulletin ID SB2024031341
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 20% Low 80%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Unprotected storage of credentials (CVE-ID: CVE-2023-49263)

The vulnerability allows a local user to gain access to other users' credentials.

The vulnerability exists due to application stored credentials in plain text in a configuration file on the system. A local user can view contents of the configuration file and gain access to passwords for 3rd party integration.


2) Use of Hard-coded Cryptographic Key (CVE-ID: CVE-2023-49264)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to use of hard-coded cryptographic key. A remote attacker can access and view communications.


3) Cleartext transmission of sensitive information (CVE-ID: CVE-2023-49265)

The vulnerability allows a local attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A local attacker can gain access to sensitive data.


4) Use of Hard-coded Cryptographic Key (CVE-ID: CVE-2023-49266)

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to use of hard-coded cryptographic key. A local attacker can access the exported file.


5) Weak password requirements (CVE-ID: CVE-2023-49267)

The vulnerability allows a local attacker to perform brute-force attack and guess the password.

The vulnerability exists due to weak password requirements. A local attacker can perform a brute-force attack and guess users' passwords.


Remediation

Install update from vendor's website.