DoS vulnerability on IndraDrive
BOSCH-SA-315415
Advisory Information
- Advisory ID: BOSCH-SA-315415
- CVE Numbers and CVSS v3.1 Scores:
- CVE-2024-48989
- Base Score: 7.5 (High)
- CVE-2024-48989
- Published: 31 Oct 2024
- Last Updated: 31 Oct 2024
Summary
A vulnerability in the PROFINET stack implementation of the IndraDrive (all versions) allows an attacker to cause a denial of service, rendering the device unresponsive by sending arbitrary UDP messages.
Affected Products
- Bosch Rexroth AG IndraDrive FWA-INDRV*-MP*
- CVE-2024-48989
- Version(s): 17VRS < 20V36
- CVE-2024-48989
Solution and Mitigations
Solution
Starting with FWA-INDRV*-MP*-20V36, the vulnerability has been fixed. Thus, it is recommended, to update your device as soon as possible.
Compensatory measures
In use cases in which a device update is not possible or not feasible, compensatory measures are recommended which prevent or at least complicate taking advantage of the vulnerability. Always define such compensatory measures individually, in the context of the operational environment.
Some possible measures are described in the “Security Manual Electric Drives and Controls”, for example the network segmentation. In general, it is highly recommended to implement the measures described in the “Security Manual Drives and Controls”.
Vulnerability Details
CVE-2024-48989
CVE description: A vulnerability in the PROFINET stack implementation of the IndraDrive (all versions) of Bosch Rexroth allows an attacker to cause a denial of service, rendering the device unresponsive by sending arbitrary UDP messages.
- Problem Type:
- CVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Base Score: 7.5 (High)
Remarks
Security Update Information
With respect to Directive (EU) 2019/770 and Directive (EU) 2019/771 and their national transposition laws, please note:
It is your responsibility to download and/or install any security updates provided by us, for example to maintain product or data security. If you fail to install a security update provided to you within a reasonable period of time, we will not be liable for any product defect solely due to the absence of such security update.
Alternatively, we are entitled to directly download and/or install security updates regardless of your settings. In these cases, we will provide you with the relevant information, e.g. in this security advisory.
CVSS Scoring
Vulnerability classification has been performed using the CVSS v3.1 scoring system . The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.
Additional Resources
- [1] Bosch Rexroth Security Manual Drives and Controls: https://www.boschrexroth.com/various/utilities/mediadirectory/download/index.jsp?object_nr=R911342562
Please contact the Bosch PSIRT if you have feedback, comments, or additional information about this vulnerability at: psirt@bosch.com .
Revision History
- 31 Oct 2024: Initial Publication
Appendix
Acknowledgement
The vulnerability has been uncovered and disclosed responsibly by Roni Gavrilov from OTORIO. We thank them for making a responsible disclosure with us.