{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T16:47:22.131","vulnerabilities":[{"cve":{"id":"CVE-2023-49722","sourceIdentifier":"psirt@bosch.com","published":"2024-01-09T10:15:20.720","lastModified":"2024-11-21T08:33:44.630","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Network port 8899 open in WiFi firmware of BCC101/BCC102/BCC50 products, that allows an attacker to connect to the device via same WiFi network."},{"lang":"es","value":"El puerto de red 8899 está abierto en el firmware WiFi de los productos BCC101/BCC102/BCC50, que permite a un atacante conectarse al dispositivo a través de la misma red WiFi."}],"metrics":{"cvssMetricV31":[{"source":"psirt@bosch.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@bosch.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1125"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:bcc101_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13.20","versionEndExcluding":"4.13.33","matchCriteriaId":"DBDA6413-E7A3-4566-9F04-4B7AB937EB4C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:bosch:bcc101:-:*:*:*:*:*:*:*","matchCriteriaId":"F914736C-5826-4A7A-A7E1-97553D324F6B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:bcc102_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13.20","versionEndExcluding":"4.13.33","matchCriteriaId":"790AE7CC-DB71-4F39-ADB2-665FEF22AEB5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:bosch:bcc102:-:*:*:*:*:*:*:*","matchCriteriaId":"1B1DB812-82C4-415E-A79E-A3464C3FAA03"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bosch:bcc50_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13.20","versionEndExcluding":"4.13.33","matchCriteriaId":"0CEEF136-27E9-49F6-A6CB-DC6AE02964A7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:bosch:bcc50:-:*:*:*:*:*:*:*","matchCriteriaId":"E3DCAF6D-ED0D-4242-870B-13C63FC69082"}]}]}],"references":[{"url":"https://psirt.bosch.com/security-advisories/BOSCH-SA-473852.html","source":"psirt@bosch.com","tags":["Vendor Advisory"]},{"url":"https://psirt.bosch.com/security-advisories/BOSCH-SA-473852.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}