Skip to main

Bosch Fire Monitoring System (FSM) affected by log4net Vulnerability


Advisory Information


A vulnerability has been discovered affecting the Bosch Fire Monitoring System (FSM-2500, FSM-5000, FSM-10k and obsolete FSM-10000). The issue applies to FSM server with version 5.6.630 and lower, and FSM client with version 5.6.2131 and lower. Bosch recommends customers to update vulnerable components with the provided patch. The vulnerability has been discovered in field.

The vulnerability CVE-2018-1285 in the affected component Apache log4net is rated with a CVSS v3.1 Base Score of 9.8 (critical), but the exploitability is reduced in a proper installation of Fire Monitoring System (FSM): local system access with administrative access rights is required to exploit the vulnerability. This leads to a lower Environmental/Overall CVSS v3.1 Score of 6.7 (medium).

Affected Products

  • Bosch FSM-10000 Client <= 5.6.2131
  • Bosch FSM-10000 Server <= 5.6.630
  • Bosch FSM-10k Client <= 5.6.2131
  • Bosch FSM-10k Server <= 5.6.630
  • Bosch FSM-2500 Client <= 5.6.2131
  • Bosch FSM-2500 Server <= 5.6.630
  • Bosch FSM-5000 Client <= 5.6.2131
  • Bosch FSM-5000 Server <= 5.6.630

Solution and Mitigations

Software Patch for FSM 5.6

A software patch is available to fix FSM server 5.6.630 and FSM client 5.6.2131. Upon execution it will temporarily stop the FSM server and replace the affected Apache log4net component.

A successful update can be verified by checking the log4net version information in the About-menu or via file properties of log4net.dll in installation folders.

Software Update

Update to a version of FSM server higher than 5.6.630 and FSM client higher than 5.6.2131.

Vulnerability Details


CVE description: Apache log4net versions before 2.0.10 do not disable XML external entities when parsing log4net configuration files. This allows for XXE-based attacks in applications that accept attacker-controlled log4net configuration files.


Security Update Information

With respect to Directive (EU) 2019/770 and Directive (EU) 2019/771 and their national transposition laws, please note:

It is your responsibility to download and/or install any security updates provided by us, for example to maintain product or data security. If you fail to install a security update provided to you within a reasonable period of time, we will not be liable for any product defect solely due to the absence of such security update.

Alternatively, we are entitled to directly download and/or install security updates regardless of your settings. In these cases, we will provide you with the relevant information, e.g. in this security advisory.

CVSS Scoring

Vulnerability classification has been performed using the CVSS v3.1 scoring system . The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.

Additional Resources

Please contact the Bosch PSIRT if you have feedback, comments, or additional information about this vulnerability at: .

Revision History

  • 23 Mar 2022: Initial Publication