Description
When using http protocol, the user password is transmitted as a clear text parameter for which it is possible to be obtained by an attacker through a MITM attack. This will be fixed starting from Firmware version 3.11.5, which will be released on the 30th of June, 2021.
Published: 2021-06-18
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-10772 When using http protocol, the user password is transmitted as a clear text parameter for which it is possible to be obtained by an attacker through a MITM attack. This will be fixed starting from Firmware version 3.11.5, which will be released on the 30th of June, 2021.
History

Mon, 16 Sep 2024 16:45:00 +0000

Type Values Removed Values Added
Title B426 Credential Disclosure B426 Credential Disclosure

Subscriptions

Bosch B426 B426 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: bosch

Published:

Updated: 2024-09-16T16:38:12.268Z

Reserved: 2021-01-12T00:00:00.000Z

Link: CVE-2021-23846

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-18T14:15:07.983

Modified: 2024-11-21T05:51:56.087

Link: CVE-2021-23846

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses