CVE-2020-6789

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code on systems running vulnerable versions of Bosch Monitor Wall installer. Attackers can achieve this by tricking users into placing a malicious DLL in the same directory as the installer. This affects all users of Bosch Monitor Wall installer version 10.00.0164 and earlier.

💻 Affected Systems

Products:
  • Bosch Monitor Wall installer
Versions: Up to and including version 10.00.0164
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction - victim must be tricked into placing malicious DLL in installer directory

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the victim's system, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive data and system resources, potentially enabling lateral movement within the network.

🟢

If Mitigated

No impact if proper security controls prevent execution of untrusted files or if the system is patched to the latest version.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: MEDIUM with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to place malicious DLL and user interaction to run installer

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version newer than 10.00.0164

Vendor Advisory: https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html

Restart Required: Yes

Instructions:

1. Download latest Bosch Monitor Wall installer from official Bosch website
2. Uninstall current version
3. Install updated version
4. Restart system

🔧 Temporary Workarounds

Restrict DLL loading from current directory

windows

Configure Windows to prevent DLL loading from current directory using SafeDllSearchMode

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

Use application whitelisting

windows

Configure Windows Defender Application Control or AppLocker to restrict execution to trusted locations only

🧯 If You Can't Patch

  • Educate users to never run installers from untrusted directories or download locations
  • Implement least privilege principles - run installer with minimal necessary permissions

🔍 How to Verify

Check if Vulnerable:

Check installed version of Bosch Monitor Wall - if version is 10.00.0164 or earlier, system is vulnerable

Check Version:

Check program properties or About dialog in Bosch Monitor Wall application

Verify Fix Applied:

Verify installed version is newer than 10.00.0164 and check vendor advisory for confirmation

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for installer from unusual directories
  • DLL loading from current directory with installer process

Network Indicators:

  • Unusual outbound connections following installer execution

SIEM Query:

Process Creation where (Image contains 'installer' OR CommandLine contains 'install') AND (CurrentDirectory contains unusual path OR ParentImage from untrusted location)

🔗 References

📤 Share & Export