The Bosch software tools AccessIPConfig.exe and AmcIpConfig.exe are used to configure certains settings in AMC2 devices. The tool allows putting a password protection on configured devices to restrict access to the configuration of an AMC2. An attacker can circumvent this protection and make unauthorized changes to configuration data on the device. An attacker can exploit this vulnerability to manipulate the device\'s configuration or make it unresponsive in the local network. The attacker needs to have access to the local network, typically even the same subnet.
References
Link | Resource |
---|---|
https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html | Mitigation Vendor Advisory |
https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 05:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://psirt.bosch.com/security-advisories/BOSCH-SA-940448-BT.html - Mitigation, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 8.8 |
Information
Published : 2022-01-19 21:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23843
Mitre link : CVE-2021-23843
CVE.ORG link : CVE-2021-23843
JSON object : View
Products Affected
bosch
- amc2
- access_management_system
- building_integration_system
- access_professional_edition
- amc2_firmware
CWE
CWE-306
Missing Authentication for Critical Function