{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T06:50:53.106","vulnerabilities":[{"cve":{"id":"CVE-2021-23846","sourceIdentifier":"psirt@bosch.com","published":"2021-06-18T14:15:07.983","lastModified":"2024-11-21T05:51:56.087","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When using http protocol, the user password is transmitted as a clear text parameter for which it is possible to be obtained by an attacker through a MITM attack. This will be fixed starting from Firmware version 3.11.5, which will be released on the 30th of June, 2021."},{"lang":"es","value":"Cuando se usa el protocolo http, la contraseña del usuario es transmitida como un parámetro de texto sin cifrar, por lo que es posible ser obtenida por un atacante mediante un ataque MITM. Esto será corregido a partir desde Firmware versión 3.11.5, que será publicado el 30 de junio de 2021"}],"metrics":{"cvssMetricV31":[{"source":"psirt@bosch.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@bosch.com","type":"Secondary","description":[{"lang":"en","value":"CWE-319"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-319"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:b426_firmware:03.01.0004:*:*:*:*:*:*:*","matchCriteriaId":"5D8D9DF7-C733-4455-A653-D78298D1FABD"},{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:b426_firmware:03.02.002:*:*:*:*:*:*:*","matchCriteriaId":"31D05CDF-6F5E-4893-BA70-928BD83A50D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:b426_firmware:03.03.0009:*:*:*:*:*:*:*","matchCriteriaId":"00336848-27F3-45CD-B799-49BEA4FED80F"},{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:b426_firmware:03.05.0003:*:*:*:*:*:*:*","matchCriteriaId":"AD4F1647-A8A1-4AAF-8C31-0474EC9539F1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:bosch:b426:-:*:*:*:*:*:*:*","matchCriteriaId":"F8846CF6-D7F7-4A65-BD96-F195D2EB1A22"}]}]}],"references":[{"url":"https://psirt.bosch.com/security-advisories/bosch-sa-196933-bt.html","source":"psirt@bosch.com","tags":["Vendor Advisory"]},{"url":"https://psirt.bosch.com/security-advisories/bosch-sa-196933-bt.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}