Description
Uncontrolled Resource Consumption in Bosch VMS Central Server in Bosch VMS 12.0.1
allows attackers to consume excessive amounts of disk space via network interface.
Published: 2026-04-15
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Resource Exhaustion
Action: Immediate Patch
AI Analysis

Impact

An uncontrolled resource consumption flaw in the Bosch VMS Central Server allows an attacker to drain disk space by sending malicious input over the network. This can lead to a denial‑of‑service condition where the system runs out of storage, potentially causing service interruptions, data loss, or cascading failures of dependent applications. The weakness is a classic CWE‑400 "Uncontrolled Resource Consumption" scenario, which affects confidentiality, integrity, and availability if not mitigated.

Affected Systems

Vendor Bosch has affected products including Bosch BVMS, Bosch BVMS Viewer, Bosch DIVAR IP 7000 R2, Bosch DIVAR IP all‑in‑one 5000, Bosch DIVAR IP all‑in‑one 7000, Bosch DIVAR IP all‑in‑one 7000 R3, DIVAR IP all‑in‑one 4000 and DIVAR IP all‑in‑one 6000 running Bosch VMS 12.0.1. The vulnerability resides in the Central Server component of VMS 12.0.1.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity, and although EPSS data is not available, the lack of a KEV listing suggests no widely known exploitation yet. The likely attack vector is remote over the network, where an attacker can send crafted traffic that consumes disk space. Successful exploitation would require network access to the affected server and could be achieved without authentication if the service is exposed.

Generated by OpenCVE AI on April 15, 2026 at 11:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Bosch VMS update that addresses the disk‑space consumption flaw, preferably version 12.0.2 or newer.
  • If applying a patch is delayed, block or restrict traffic to the VMS Central Server from untrusted networks and limit write permissions on the disk volume used by the VMS.
  • Configure disk‑space monitoring and alerts, and enforce quotas to prevent the VMS process from consuming all available storage.

Generated by OpenCVE AI on April 15, 2026 at 11:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Bosch
Bosch bvms
Bosch bvms Viewer
Bosch divar Ip 7000 R2
Bosch divar Ip All-in-one 4000
Bosch divar Ip All-in-one 5000
Bosch divar Ip All-in-one 6000
Bosch divar Ip All-in-one 7000
Bosch divar Ip All-in-one 7000 R3
Vendors & Products Bosch
Bosch bvms
Bosch bvms Viewer
Bosch divar Ip 7000 R2
Bosch divar Ip All-in-one 4000
Bosch divar Ip All-in-one 5000
Bosch divar Ip All-in-one 6000
Bosch divar Ip All-in-one 7000
Bosch divar Ip All-in-one 7000 R3

Wed, 15 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Title Uncontrolled Resource Consumption via Disk Usage in Bosch VMS Central Server

Wed, 15 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Description Uncontrolled Resource Consumption in Bosch VMS Central Server in Bosch VMS 12.0.1 allows attackers to consume excessive amounts of disk space via network interface.
Weaknesses CWE-400
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Bosch Bvms Bvms Viewer Divar Ip 7000 R2 Divar Ip All-in-one 4000 Divar Ip All-in-one 5000 Divar Ip All-in-one 6000 Divar Ip All-in-one 7000 Divar Ip All-in-one 7000 R3
cve-icon MITRE

Status: PUBLISHED

Assigner: bosch

Published:

Updated: 2026-04-15T13:09:13.468Z

Reserved: 2024-06-17T09:19:04.535Z

Link: CVE-2024-33618

cve-icon Vulnrichment

Updated: 2026-04-15T13:09:10.441Z

cve-icon NVD

Status : Received

Published: 2026-04-15T10:16:37.120

Modified: 2026-04-15T10:16:37.120

Link: CVE-2024-33618

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:53:05Z

Weaknesses