Advisory Details

June 3rd, 2021

Bosch B426 Web Configuration Use of Hard-coded Password Authentication Bypass Vulnerability

ZDI-21-644
ZDI-CAN-13074

CVE ID CVE-2021-23845
CVSS SCORE 8.8, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Bosch
AFFECTED PRODUCTS B426
VULNERABILITY DETAILS

This vulnerability allows remote attackers to bypass authentication on affected installations of Bosch B426. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the lgs.cgi module. This issue results from the use of hard-coded session token. An attacker can leverage this vulnerability to bypass authentication on the system.

ADDITIONAL DETAILS Bosch has issued an update to correct this vulnerability. More details can be found at:
https://psirt.bosch.com/security-advisories/bosch-sa-196933-bt.html
DISCLOSURE TIMELINE
  • 2021-01-29 - Vulnerability reported to vendor
  • 2021-06-03 - Coordinated public release of advisory
  • 2021-06-07 - Advisory Updated
CREDIT Chizuru Toyama of TXOne IoT/ICS Security Research Labs
BACK TO ADVISORIES