Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
The recommended approach is to update the software to a fixed version as soon as possible. Until a fixed software version is installed, the mitigation approaches firewalling, and IP filtering can be utilized. For further informatation please check the published security advisory.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-16512 | A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The RCP+ network port allows access without authentication. Adding authentication feature to the respective library fixes the issue. The issue is classified as "CWE-284: Improper Access Control." This vulnerability, for example, allows a potential attacker to delete video or read video data. |
No history.
Subscriptions
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T00:46:00.474Z
Reserved: 2019-01-25T00:00:00.000Z
Link: CVE-2019-6958
No data.
Status : Modified
Published: 2019-05-29T19:29:00.703
Modified: 2024-11-21T04:47:18.280
Link: CVE-2019-6958
No data.
OpenCVE Enrichment
No data.
EUVD