{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T18:56:06.187","vulnerabilities":[{"cve":{"id":"CVE-2019-11684","sourceIdentifier":"cve@mitre.org","published":"2021-02-26T16:15:12.217","lastModified":"2024-11-21T04:21:35.223","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 < v3.71.0034 and v3.81 < 3.81.0050; DIVAR IP 5000 3.80 < 3.80.0039; BVMS all versions using VRM."},{"lang":"es","value":"Un control de acceso inapropiado en el servidor RCP+ del componente Bosch Video Recording Manager (VRM), permite el acceso arbitrario y no autenticado a un subconjunto limitado de certificados, almacenados en el sistema operativo subyacente de Microsoft Windows.&#xa0;Las versiones corregidas implementan comprobaciones de autenticación modificadas.&#xa0;Las versiones anteriores a 3.70 del software VRM no son consideradas afectadas.&#xa0;Esta vulnerabilidad afecta a VRM versiones v3.70.x, v3.71 anteriores a v3.71.0034 y versiones v3.81 anteriores a 3.81.0050;&#xa0;DIVAR IP 5000 versiones 3.80 anteriores a 3.80.0039;&#xa0;BVMS todas las versiones que usan VRM"}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":5.3},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"3.70","versionEndExcluding":"3.71.0034","matchCriteriaId":"3BF60397-29D1-4764-913F-96F07DE1A403"},{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"3.81","versionEndExcluding":"3.81.0050","matchCriteriaId":"B3E94AB7-ABC6-4B3C-97A9-78A8495E793A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.80","versionEndExcluding":"3.80.0039","matchCriteriaId":"8D5204C5-A853-408E-A7DA-8312056693F7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*","matchCriteriaId":"AB0DE1C9-D3C0-49BF-9FFD-B765F9AF6691"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_management_system:3.70.0056:*:*:*:*:*:*:*","matchCriteriaId":"230D1A5C-D2B1-48E9-A9A1-EDE65491B715"},{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_management_system:3.70.0058:*:*:*:*:*:*:*","matchCriteriaId":"60BD9A29-1D4C-44AC-8169-DCDABD21424E"},{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_management_system:3.70.0060:*:*:*:*:*:*:*","matchCriteriaId":"2EB8AC9A-7802-4D29-BA8A-FB2E300F3CF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_management_system:3.70.0062:*:*:*:*:*:*:*","matchCriteriaId":"0BE9BAD2-B925-4507-805D-0006850CF815"},{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_management_system:3.71.0022:*:*:*:*:*:*:*","matchCriteriaId":"8B53DABF-8D3C-4470-A981-12363D230938"},{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_management_system:3.71.0029:*:*:*:*:*:*:*","matchCriteriaId":"68F65CA5-9032-4DF3-8FA5-122B571DC4A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_management_system:3.71.0031:*:*:*:*:*:*:*","matchCriteriaId":"800E0CBC-591B-4EDC-9E3D-633AD3921F5F"},{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_management_system:3.71.0032:*:*:*:*:*:*:*","matchCriteriaId":"327610AC-25F3-4017-9F19-EA13CAE9EC1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_management_system:3.81.0032:*:*:*:*:*:*:*","matchCriteriaId":"6AD6ED4A-EAE2-4AD6-AF48-A6383B9F8257"},{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_management_system:3.81.0038:*:*:*:*:*:*:*","matchCriteriaId":"8514A9F2-D0AC-4AD4-878C-C1E21D2029E2"},{"vulnerable":true,"criteria":"cpe:2.3:a:bosch:video_management_system:3.81.0048:*:*:*:*:*:*:*","matchCriteriaId":"4677B06D-B4A9-4892-B735-71FE614E51FD"}]}]}],"references":[{"url":"https://psirt.bosch.com/security-advisories/bosch-sa-804652.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://psirt.bosch.com/security-advisories/bosch-sa-804652.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}