A potential improper access control vulnerability exists in the JSON-RPC interface of the Bosch Smart Home Controller (SHC) before 9.8.905 that may result in reading or modification of the SHC's configuration or triggering and restoring backups. In order to exploit the vulnerability, the adversary needs to have successfully paired an app or service, which requires user interaction.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-3550 | A potential improper access control vulnerability exists in the JSON-RPC interface of the Bosch Smart Home Controller (SHC) before 9.8.905 that may result in reading or modification of the SHC's configuration or triggering and restoring backups. In order to exploit the vulnerability, the adversary needs to have successfully paired an app or service, which requires user interaction. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://psirt.bosch.com/Advisory/BOSCH-SA-662084.html |
|
History
No history.
Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2024-09-16T17:42:58.052Z
Reserved: 2019-05-13T00:00:00
Link: CVE-2019-11892
No data.
Status : Modified
Published: 2019-05-29T20:29:00.253
Modified: 2024-11-21T04:21:58.300
Link: CVE-2019-11892
No data.
OpenCVE Enrichment
No data.
EUVD