{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T00:47:48.501","vulnerabilities":[{"cve":{"id":"CVE-2021-23847","sourceIdentifier":"psirt@bosch.com","published":"2021-06-09T15:15:08.187","lastModified":"2024-11-21T05:51:56.220","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Missing Authentication in Critical Function in Bosch IP cameras allows an unauthenticated remote attacker to extract sensitive information or change settings of the camera by sending crafted requests to the device. Only devices of the CPP6, CPP7 and CPP7.3 family with firmware 7.70, 7.72, and 7.80 prior to B128 are affected by this vulnerability. Versions 7.62 or lower and INTEOX cameras are not affected."},{"lang":"es","value":"Una Falta de Autenticación en una Función Crítica en las cámaras Bosch IP, permite a un atacante remoto no autenticado extraer información confidencial o cambiar la configuración de la cámara mediante el envío de peticiónes diseñadas al dispositivo.&#xa0;Solo los dispositivos de la familia CPP6, CPP7 y CPP7.3 con versiones de firmware 7.70, 7.72 y 7.80 anteriores a B128 están afectados por esta vulnerabilidad.&#xa0;Las versiones 7.62 o inferiores y las cámaras INTEOX no están afectadas"}],"metrics":{"cvssMetricV31":[{"source":"psirt@bosch.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@bosch.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:cpp6_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"7.80","versionEndExcluding":"7.80.0129","matchCriteriaId":"A169603C-C2A4-4345-A384-BF6B75C62849"},{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:cpp6_firmware:7.70:*:*:*:*:*:*:*","matchCriteriaId":"ED954BF7-DD03-4B91-8F4F-CACE2E8BDDA0"},{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:cpp6_firmware:7.72:*:*:*:*:*:*:*","matchCriteriaId":"9E3D5E9E-A2FA-424D-893F-6D5C92F5D717"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:bosch:cpp6:-:*:*:*:*:*:*:*","matchCriteriaId":"27B65C05-69F5-4048-BCBE-DA0D53EF9AFE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:cpp7_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"7.80","versionEndExcluding":"7.80.0129","matchCriteriaId":"1B8D22B9-545A-4507-9496-ED843FD7C55B"},{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:cpp7_firmware:7.70:*:*:*:*:*:*:*","matchCriteriaId":"7DA98BAE-2029-43EF-9B62-08183FB24BC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:cpp7_firmware:7.72:*:*:*:*:*:*:*","matchCriteriaId":"29E2AC5D-E6AA-4835-95A0-DE4885001BE6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:bosch:cpp7:-:*:*:*:*:*:*:*","matchCriteriaId":"E8339008-8889-47B0-9416-CCC6CE75D277"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:cpp7.3_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"7.80","versionEndExcluding":"7.80.0129","matchCriteriaId":"BAF9F4E2-BE45-40B4-A63C-75777CF63A26"},{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:cpp7.3_firmware:7.70:*:*:*:*:*:*:*","matchCriteriaId":"7113AE94-1C25-40AF-98F9-0A457DE063B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:cpp7.3_firmware:7.72:*:*:*:*:*:*:*","matchCriteriaId":"B0EF3F6B-C978-4BB3-B33E-EA809CE9E851"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:bosch:cpp7.3:-:*:*:*:*:*:*:*","matchCriteriaId":"5B97B95A-8143-4766-9F10-87E19AED22C6"}]}]}],"references":[{"url":"https://psirt.bosch.com/security-advisories/bosch-sa-478243-bt.html","source":"psirt@bosch.com","tags":["Vendor Advisory"]},{"url":"https://psirt.bosch.com/security-advisories/bosch-sa-478243-bt.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}