CVE-2021-23862

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated administrative users to send specially crafted configuration packets that execute arbitrary commands with system-level privileges. It affects Bosch security and video management systems including VRM, DIVAR IP, BVMS with VRM, and VIDEOJET decoders. Attackers with administrative access can achieve remote code execution on affected devices.

💻 Affected Systems

Products:
  • VRM
  • DIVAR IP
  • BVMS with VRM installed
  • VIDEOJET decoder VJD-7513
  • VIDEOJET decoder VJD-8000
Versions: All versions prior to patches released in 2021
Operating Systems: Embedded systems running Bosch software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrative access to exploit. Affects both internet-facing and internal systems with administrative interfaces exposed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands as root/system, potentially leading to data theft, system destruction, or lateral movement within networks.

🟠

Likely Case

Authenticated attackers gaining full control of affected systems to install malware, exfiltrate sensitive video/security data, or disrupt security operations.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access controls, and monitoring are implemented to detect anomalous administrative activity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative credentials but is straightforward once authenticated. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific product versions

Vendor Advisory: https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html

Restart Required: Yes

Instructions:

1. Review Bosch security advisory SA-043434-BT. 2. Identify affected products and versions. 3. Apply vendor-provided patches or firmware updates. 4. Restart affected systems. 5. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict administrative interface access to trusted networks only

Access Control Hardening

all

Implement strict administrative access controls and multi-factor authentication

🧯 If You Can't Patch

  • Isolate affected systems in dedicated VLANs with strict firewall rules
  • Implement network monitoring for anomalous configuration packet traffic

🔍 How to Verify

Check if Vulnerable:

Check system version against vendor advisory and verify if running vulnerable firmware

Check Version:

Check via product web interface or CLI (product-specific commands vary)

Verify Fix Applied:

Verify installed firmware version matches patched versions listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual configuration changes
  • Multiple failed authentication attempts followed by successful login
  • Unexpected command execution logs

Network Indicators:

  • Anomalous configuration packet traffic to administrative interfaces
  • Unexpected outbound connections from security systems

SIEM Query:

source="bosch_security_system" AND (event_type="configuration_change" OR event_type="command_execution")

🔗 References

📤 Share & Export