Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-6767 : Vulnerability Insights and Analysis

Learn about CVE-2020-6767, a path traversal vulnerability in Bosch Video Management System (BVMS) allowing remote attackers to read arbitrary files. Find mitigation steps and affected systems here.

A path traversal vulnerability in the Bosch Video Management System (BVMS) FileTransferService allows an authenticated remote attacker to read arbitrary files from the Central Server. This vulnerability affects various Bosch products.

Understanding CVE-2020-6767

This CVE involves a path traversal vulnerability in Bosch Video Management System (BVMS) that can be exploited by an authenticated remote attacker.

What is CVE-2020-6767?

CVE-2020-6767 is a path traversal vulnerability in the Bosch Video Management System (BVMS) FileTransferService, enabling a remote attacker to access arbitrary files on the Central Server.

The Impact of CVE-2020-6767

The vulnerability has a CVSS base score of 7.7, indicating a high severity level. It poses a significant risk to confidentiality.

Technical Details of CVE-2020-6767

This section provides detailed technical information about the vulnerability.

Vulnerability Description

The vulnerability allows an authenticated remote attacker to read arbitrary files from the Central Server through the BVMS FileTransferService.

Affected Systems and Versions

        Bosch Video Management System versions 7.0 and older, 7.5 and older, 8.0 through 8.0.0.329, 9.0 through 9.0.0.827, and 10.0 through 10.0.0.1225
        BVMS Viewer versions 7.0 and older, 7.5 and older, 8.0 through 8.0.0.329, 9.0 through 9.0.0.827, and 10.0 through 10.0.0.1225
        DIVAR IP 3000, DIVAR IP 7000, and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed

Exploitation Mechanism

The vulnerability can be exploited by an authenticated remote attacker to traverse the file system and access sensitive files on the Central Server.

Mitigation and Prevention

To address CVE-2020-6767, users and administrators should take immediate and long-term security measures.

Immediate Steps to Take

        Update Bosch BVMS and BVMS Viewer to the latest patched versions.
        Implement network segmentation to restrict access to BVMS services.
        Monitor and analyze file access logs for suspicious activities.

Long-Term Security Practices

        Regularly update and patch all Bosch software and systems.
        Conduct security assessments and penetration testing to identify vulnerabilities.

Patching and Updates

        Apply security patches provided by Bosch for the affected products and versions.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now