CVE-2020-6785

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code on affected systems by exploiting DLL hijacking in Bosch BVMS and related products. It affects both the installer and installed application, potentially compromising video management systems. Organizations using vulnerable versions of Bosch BVMS, BVMS Viewer, and DIVAR IP devices are at risk.

💻 Affected Systems

Products:
  • Bosch BVMS
  • Bosch BVMS Viewer
  • Bosch DIVAR IP 7000 R2
  • Bosch DIVAR IP all-in-one 5000
  • Bosch DIVAR IP all-in-one 7000
Versions: BVMS versions 10.1.0, 10.0.1, 10.0.0, 9.0.0 and older
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both the installer and installed application; systems with BVMS 10.1.1 or later are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware execution by an attacker with access to the system, potentially disrupting video surveillance operations.

🟢

If Mitigated

Limited impact if proper access controls and patching are in place, reducing the attack surface to trusted users only.

🌐 Internet-Facing: MEDIUM, as exploitation typically requires local access, but could be combined with other vulnerabilities for remote attacks.
🏢 Internal Only: HIGH, due to the potential for insider threats or compromised internal accounts to exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to place a malicious DLL in a search path, but no public exploits are known as of the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BVMS 10.1.1 or later

Vendor Advisory: https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html

Restart Required: Yes

Instructions:

1. Download and install BVMS 10.1.1 or later from Bosch. 2. Apply the update to all affected systems. 3. Restart the systems to ensure changes take effect.

🔧 Temporary Workarounds

Restrict DLL Search Path

windows

Modify system settings to prevent loading DLLs from untrusted directories, reducing the risk of hijacking.

Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -Name 'SafeDllSearchMode' -Value 1

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges and prevent unauthorized file writes.
  • Monitor for suspicious DLL loading events and use application whitelisting to block untrusted executables.

🔍 How to Verify

Check if Vulnerable:

Check the installed BVMS version via the application interface or system registry; versions 10.1.0 or older indicate vulnerability.

Check Version:

wmic product where name like '%BVMS%' get version

Verify Fix Applied:

Confirm the version is 10.1.1 or later and test for DLL hijacking by attempting to place a benign DLL in a search path to see if it loads.

📡 Detection & Monitoring

Log Indicators:

  • Event logs showing DLL loading from unusual paths or failed integrity checks

Network Indicators:

  • Unusual outbound connections from BVMS processes post-exploitation

SIEM Query:

EventID=4688 AND ProcessName LIKE '%bvms%' AND CommandLine CONTAINS 'dll'

🔗 References

📤 Share & Export