Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-28175 : What You Need to Know

Learn about CVE-2023-28175, an improper authorization flaw in Bosch VMS versions 11.0-11.1.1, allowing remote users to access internal resources via SSH port forwarding.

This CVE record pertains to an improper authorization vulnerability in the SSH server in Bosch VMS versions 11.0, 11.1.0, and 11.1.1. The vulnerability allows remote authenticated users to access resources within the trusted internal network through a port forwarding request.

Understanding CVE-2023-28175

This section provides an in-depth look at the nature and impact of CVE-2023-28175.

What is CVE-2023-28175?

CVE-2023-28175 is classified as an "Improper Authorization" vulnerability in the SSH server of Bosch VMS software versions 11.0, 11.1.0, and 11.1.1. It enables remote authenticated users to gain unauthorized access to resources within the trusted internal network by exploiting a port forwarding request.

The Impact of CVE-2023-28175

The impact of this vulnerability is rated as HIGH, with a base severity score of 7.1 according to the CVSS v3.1 metrics. The confidentiality of the affected systems is at risk due to the exposure of sensitive information to unauthorized actors. While the integrity impact is low, the potential for compromising confidentiality is a significant concern.

Technical Details of CVE-2023-28175

In this section, we delve into the technical aspects of CVE-2023-28175 to understand its implications better.

Vulnerability Description

The vulnerability arises from improper authorization mechanisms in the SSH server of Bosch VMS versions 11.0, 11.1.0, and 11.1.1, enabling remote authenticated users to bypass security controls and access resources within the internal network.

Affected Systems and Versions

Various Bosch products are affected by CVE-2023-28175, including Bosch BVMS, BVMS Viewer, Bosch DIVAR IP 3000, Bosch DIVAR IP 7000 series, and more. Versions ranging from 7.5 to 11.1.1 are impacted, depending on the product.

Exploitation Mechanism

The vulnerability can be exploited by a remote authenticated user sending a port forwarding request to the SSH server, thereby gaining unauthorized access to resources within the trusted internal network.

Mitigation and Prevention

Mitigating CVE-2023-28175 requires immediate action and long-term security measures to safeguard affected systems.

Immediate Steps to Take

        Apply the security patches released by Bosch to address the vulnerability in the affected products.
        Restrict network access to the SSH server to trusted users only.
        Monitor network traffic for any suspicious activity that could indicate exploitation of the vulnerability.

Long-Term Security Practices

        Conduct regular security assessments and audits to identify and address vulnerabilities promptly.
        Implement access controls and least privilege principles to limit user permissions within the network.
        Keep software and systems up to date with the latest security patches and updates.

Patching and Updates

Refer to the Bosch security advisory (URL: https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html) for detailed information on the vulnerability and instructions on patching affected systems. Regularly check for updates and apply patches as soon as they become available to mitigate the risk associated with CVE-2023-28175.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now