CVE-2021-23847

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in Bosch IP cameras allows unauthenticated remote attackers to extract sensitive information or modify camera settings by sending crafted requests. Only CPP6, CPP7, and CPP7.3 family devices with firmware versions 7.70, 7.72, and 7.80 prior to B128 are affected.

💻 Affected Systems

Products:
  • Bosch CPP6 IP cameras
  • Bosch CPP7 IP cameras
  • Bosch CPP7.3 IP cameras
Versions: Firmware 7.70, 7.72, and 7.80 prior to B128
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Versions 7.62 or lower and INTEOX cameras are NOT affected

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of camera functionality including disabling security features, extracting credentials, or using camera as pivot point into internal networks

🟠

Likely Case

Unauthorized access to camera feeds, configuration changes, or extraction of sensitive device information

🟢

If Mitigated

Limited impact if cameras are isolated in separate network segments with strict access controls

🌐 Internet-Facing: HIGH - Directly exploitable from internet without authentication
🏢 Internal Only: HIGH - Still exploitable from internal networks without authentication

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Crafting requests requires understanding of camera API but no authentication needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version B128 or later

Vendor Advisory: https://psirt.bosch.com/security-advisories/bosch-sa-478243-bt.html

Restart Required: Yes

Instructions:

1. Download firmware B128 or later from Bosch support portal. 2. Upload firmware to camera via web interface. 3. Apply update. 4. Reboot camera.

🔧 Temporary Workarounds

Network segmentation

all

Isolate cameras in separate VLAN with strict firewall rules

Access control lists

all

Implement IP-based restrictions to limit camera access

🧯 If You Can't Patch

  • Remove cameras from internet-facing networks immediately
  • Implement strict network segmentation and firewall rules to limit camera access

🔍 How to Verify

Check if Vulnerable:

Check camera firmware version via web interface or API. If version is 7.70, 7.72, or 7.80 and build number is lower than B128, device is vulnerable.

Check Version:

Check via camera web interface at /cgi-bin/version.cgi or similar endpoint

Verify Fix Applied:

Verify firmware version shows B128 or later after update

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated API requests to configuration endpoints
  • Multiple failed authentication attempts followed by successful configuration changes

Network Indicators:

  • Unusual HTTP requests to camera configuration endpoints from unauthorized IPs
  • Traffic patterns indicating configuration changes without authentication

SIEM Query:

source_ip NOT IN authorized_ips AND dest_port=80 AND (uri CONTAINS "/cgi-bin/" OR uri CONTAINS "/config")

🔗 References

📤 Share & Export