CVE-2023-48257

7.8 HIGH

📋 TL;DR

This vulnerability in Bosch security systems allows attackers to access sensitive data or achieve remote code execution with root privileges. It affects authenticated users directly via HTTP requests and unauthenticated users indirectly through backup package manipulation. The vulnerability impacts multiple Bosch security products.

💻 Affected Systems

Products:
  • Bosch BIS, Bosch DIVAR IP, Bosch BVMS
Versions: Multiple versions prior to specific patched releases
Operating Systems: Embedded Linux systems in Bosch security devices
Default Config Vulnerable: ⚠️ Yes
Notes: Affects backup/restore functionality in Bosch security management systems

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains root-level remote code execution, potentially taking full control of affected security devices and accessing all data.

🟠

Likely Case

Unauthenticated attackers access sensitive data from exported backup packages or craft malicious import packages to compromise authenticated users.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to isolated security systems without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of backup/restore mechanisms and HTTP request crafting

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Bosch security advisory for specific product versions

Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html

Restart Required: Yes

Instructions:

1. Review Bosch security advisory BOSCH-SA-711465. 2. Identify affected products and versions. 3. Apply vendor-provided patches. 4. Restart affected systems. 5. Verify patch installation.

🔧 Temporary Workarounds

Disable backup/restore functionality

all

Temporarily disable backup creation and import features if not critically needed

Network segmentation

all

Isolate Bosch security systems from untrusted networks and limit access to management interfaces

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access backup/restore functionality
  • Monitor for unusual backup creation or import activities and investigate anomalies

🔍 How to Verify

Check if Vulnerable:

Check system version against affected versions listed in Bosch advisory BOSCH-SA-711465

Check Version:

Check product-specific version commands via device web interface or CLI

Verify Fix Applied:

Verify installed version matches or exceeds patched versions specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual backup creation or import activities
  • HTTP requests to backup/restore endpoints from unexpected sources
  • Failed authentication attempts followed by backup operations

Network Indicators:

  • HTTP traffic to backup/restore endpoints from unauthorized IPs
  • Large data transfers during backup operations to unexpected destinations

SIEM Query:

source_ip NOT IN (allowed_management_ips) AND (uri CONTAINS 'backup' OR uri CONTAINS 'restore' OR uri CONTAINS 'import')

🔗 References

📤 Share & Export