CVE-2021-23859

9.1 CRITICAL

📋 TL;DR

An unauthenticated attacker can send a special HTTP request to crash the service, potentially enabling further unauthenticated commands on standalone VRM or BVMS with VRM installations. This affects Bosch Video Recording Manager (VRM) and Building Video Management System (BVMS) with VRM. Some products have local-only interfaces, reducing exposure.

💻 Affected Systems

Products:
  • Bosch Video Recording Manager (VRM)
  • Bosch Building Video Management System (BVMS) with VRM
Versions: Specific versions listed in Bosch advisory (check vendor link)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Standalone VRM or BVMS with VRM installations are most vulnerable; some products have local-only interfaces.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via unauthenticated remote code execution, leading to data theft, system manipulation, or service disruption.

🟠

Likely Case

Service denial-of-service (crash) with potential for limited unauthenticated command execution on vulnerable configurations.

🟢

If Mitigated

Limited to local network exploitation or prevented by network segmentation and access controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a crafted HTTP request; complexity is low for DoS, potentially higher for command execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Bosch advisory for specific patched versions

Vendor Advisory: https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html

Restart Required: Yes

Instructions:

1. Review Bosch advisory for affected versions. 2. Apply the recommended patch or update to a fixed version. 3. Restart the service or system as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to VRM/BVMS services to trusted IPs only.

Use firewall rules to allow only necessary traffic (e.g., iptables -A INPUT -s <trusted_ip> -p tcp --dport <service_port> -j ACCEPT)

Disable Unnecessary Interfaces

all

If possible, disable HTTP interfaces that are not required for operation.

Consult Bosch documentation for interface configuration

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted sources only.
  • Monitor logs for unusual HTTP requests or service crashes and have an incident response plan ready.

🔍 How to Verify

Check if Vulnerable:

Check system version against Bosch advisory; monitor for service crashes after suspicious HTTP requests.

Check Version:

Consult Bosch documentation for version check commands specific to VRM/BVMS.

Verify Fix Applied:

Verify patch installation by checking version number and testing service stability.

📡 Detection & Monitoring

Log Indicators:

  • Service crash logs
  • Unusual HTTP request patterns in access logs

Network Indicators:

  • Unexpected HTTP requests to VRM/BVMS ports
  • Increased traffic to service ports

SIEM Query:

Example: search 'VRM crash' OR 'BVMS crash' in system logs

🔗 References

📤 Share & Export