CVE-2021-23845

8.0 HIGH

📋 TL;DR

This session hijacking vulnerability in Bosch B426/B429 configuration web pages allows attackers to take over authenticated user sessions. Affected systems include Bosch B426-CN/B429-CN and B426-M devices running vulnerable software versions. The vulnerability enables unauthorized access to device configuration interfaces.

💻 Affected Systems

Products:
  • Bosch B426-CN
  • Bosch B429-CN
  • Bosch B426-M
Versions: Versions before 3.08
Operating Systems: Embedded systems running Bosch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects the configuration web interface specifically. Requires attacker access to the same network segment as the device.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to reconfigure security settings, disable protections, or use device as pivot point into internal networks.

🟠

Likely Case

Unauthorized access to device configuration leading to service disruption, data exposure, or security policy changes.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to configuration interfaces.

🌐 Internet-Facing: HIGH if configuration interface exposed to internet without authentication controls.
🏢 Internal Only: MEDIUM as internal attackers could exploit to gain elevated privileges on affected devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to intercept or predict session tokens while user is actively using configuration interface. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.08 and later

Vendor Advisory: https://psirt.bosch.com/security-advisories/bosch-sa-196933-bt.html

Restart Required: Yes

Instructions:

1. Download firmware version 3.08 or later from Bosch support portal. 2. Backup current configuration. 3. Upload new firmware via web interface. 4. Reboot device. 5. Verify version shows 3.08 or higher.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to configuration interface to trusted management networks only

Configure firewall rules to block external access to device management IP/ports

Session Timeout Reduction

all

Reduce session timeout values to limit window for session hijacking

Configure web interface session timeout to minimum practical value

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict access controls
  • Implement network monitoring for unusual access patterns to configuration interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System > About or similar menu. If version is below 3.08, device is vulnerable.

Check Version:

Access device web interface and navigate to System Information/About page

Verify Fix Applied:

After patching, verify version shows 3.08 or higher in System > About. Test session management by logging out and confirming session termination.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login from different IP
  • Session ID reuse from different source IPs
  • Configuration changes from unexpected IP addresses

Network Indicators:

  • Unusual traffic patterns to device management ports
  • Session token interception attempts
  • Multiple connections to configuration interface from same source

SIEM Query:

source_ip!=allowed_management_ip AND dest_port=443 AND uri_path CONTAINS "/config/" AND http_status=200

🔗 References

📤 Share & Export