Overview
- Description
- A vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an authenticated remote attacker with admin privileges to mount a stored Cross-Site-Scripting (XSS) attack against another user. When the victim logs into the management interface, the stored script code is executed in the context of his browser. A successful exploit would allow an attacker to interact with the management interface with the privileges of the victim. However, as the attacker already needs admin privileges, there is no additional impact on the management interface itself.
- Source
- psirt@bosch.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 4.8
- Impact score
- 2.7
- Exploitability score
- 1.7
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:N/I:P/A:N
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:praesideo_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F9C21DF-F581-4BF7-BE1A-A0C20E80D639", "versionEndIncluding": "4.41" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:praesideo:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5804DF8F-258A-4FBB-9F4E-A4F53FB9F475" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:bosch:praesensa_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "154814F9-43C6-47CA-A727-05CE65586350", "versionEndIncluding": "1.10" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:bosch:praesensa:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "03D7F910-C45F-4D27-A526-54C3DC227971" } ], "operator": "OR" } ], "operator": "AND" } ]