Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-23847 : Vulnerability Insights and Analysis

Learn about CVE-2021-23847 affecting Bosch IP cameras with specific firmware versions. Understand the impact, affected systems, exploitation mechanism, and mitigation steps.

Bosch IP cameras with specific firmware versions are vulnerable to an Unauthenticated Information Extraction flaw, allowing remote attackers to access sensitive data without authentication.

Understanding CVE-2021-23847

This CVE relates to a security vulnerability in Bosch IP cameras that could be exploited by unauthenticated attackers to extract sensitive information.

What is CVE-2021-23847?

A Missing Authentication in Critical Function in Bosch IP cameras allows an unauthenticated remote attacker to extract sensitive information or change settings of the camera by sending crafted requests to the device. The vulnerability affects devices of the CPP6, CPP7, and CPP7.3 family with firmware versions 7.70, 7.72, and 7.80 prior to B128.

The Impact of CVE-2021-23847

The impact of this critical vulnerability is high, with a base score of 9.8 according to CVSS v3.1. Attackers can exploit the flaw over the network without user interaction, leading to confidentiality and integrity breaches.

Technical Details of CVE-2021-23847

This section covers specific technical details of the CVE.

Vulnerability Description

The vulnerability arises from a missing authentication check in a critical function of Bosch IP cameras.

Affected Systems and Versions

Only devices of the CPP6, CPP7, and CPP7.3 family with firmware versions 7.70, 7.72, and 7.80 prior to B128 are affected. Versions 7.62 or lower and INTEOX cameras are not vulnerable.

Exploitation Mechanism

Attackers can exploit this vulnerability remotely by sending specially crafted requests to the affected camera.

Mitigation and Prevention

To mitigate the risk associated with CVE-2021-23847, users and administrators should take immediate steps and adopt long-term security practices.

Immediate Steps to Take

        Update the firmware of affected Bosch IP cameras to version 7.80 B128 or higher.
        Implement network segmentation to restrict access to vulnerable devices.
        Monitor network traffic for any signs of exploitation.

Long-Term Security Practices

        Regularly update firmware and security patches for all connected devices.
        Conduct security audits and penetration testing to identify vulnerabilities.
        Educate users on best security practices to prevent unauthorized access.

Patching and Updates

Bosch has released a patch to address the vulnerability. Users should apply the patch immediately to secure their devices.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now