CVE-2020-6769

10.0 CRITICAL

📋 TL;DR

This critical vulnerability in Bosch Video Streaming Gateway allows unauthenticated remote attackers to access and modify configuration data without authentication. This can compromise the confidentiality and availability of live/recorded video feeds and storage systems. Affected systems include Bosch VSG versions 6.42.10 through 6.45.08 and various DIVAR IP products with vulnerable configurations.

💻 Affected Systems

Products:
  • Bosch Video Streaming Gateway
  • Bosch DIVAR IP 3000
  • Bosch DIVAR IP 7000
  • Bosch DIVAR IP all-in-one 5000
  • Bosch DIVAR IP 2000
  • Bosch DIVAR IP 5000
Versions: VSG: 6.45 <= 6.45.08, 6.44 <= 6.44.022, 6.43 <= 6.43.0023, 6.42.10 and older; DIVAR IP 2000 <= 3.62.0019; DIVAR IP 5000 <= 3.80.0039
Default Config Vulnerable: ⚠️ Yes
Notes: DIVAR IP products are only affected if vulnerable VSG version is installed with BVMS or if port 8023 is opened in firewall

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all video surveillance systems, unauthorized access to live/recorded footage, disruption of recording capabilities, and potential pivot to internal networks.

🟠

Likely Case

Unauthorized viewing of surveillance footage, modification of recording settings, and potential denial of service to video monitoring systems.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability requires no authentication and has CVSS 10.0 score, making exploitation straightforward for attackers with network access

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: VSG 6.45.09, 6.44.023, 6.43.0024, and later versions

Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-260625-BT.html

Restart Required: Yes

Instructions:

1. Download updated firmware from Bosch support portal. 2. Backup current configuration. 3. Apply firmware update following Bosch documentation. 4. Verify update completed successfully. 5. Restart affected devices.

🔧 Temporary Workarounds

Block Port 8023

linux

Block external access to vulnerable port 8023 using firewall rules

iptables -A INPUT -p tcp --dport 8023 -j DROP

Network Segmentation

all

Isolate VSG and DIVAR IP systems from untrusted networks

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from internet and untrusted networks
  • Deploy network monitoring and intrusion detection for traffic on port 8023

🔍 How to Verify

Check if Vulnerable:

Check VSG version in web interface or via SSH: cat /etc/version or similar version file

Check Version:

ssh admin@device 'cat /etc/version' or check web admin interface

Verify Fix Applied:

Verify version is updated to patched versions: VSG 6.45.09, 6.44.023, 6.43.0024 or later

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to port 8023
  • Configuration changes without authentication logs
  • Unusual access patterns to VSG services

Network Indicators:

  • External connections to port 8023
  • Unusual traffic patterns to/from VSG systems
  • Configuration data being transmitted unencrypted

SIEM Query:

source_port=8023 AND (action="modify" OR action="retrieve") AND auth_status="failed"

🔗 References

📤 Share & Export