Skip to main

Vulnerabilities in Bosch PRAESIDEO and PRAESENSA

BOSCH-SA-538331-BT

Advisory Information

Summary

Two security vulnerabilities have been uncovered in the web based management interface of the PRAESIDEO Network Controller and the PRAESENSA System Controller. The vulnerabilities will allow a Cross-Site Request Forgery (CSRF) attack and a Cross-site Scripting (XSS) attack.

For PRAESIDEO a third vulnerability will allow a replay attack with which authentication can be bypassed. This last vulnerability is present in the web server of the PRAESIDEO Network Controller.

All hardware revisions of the PRAESIDEO Network Controller and the PRAESENSA System Controller are affected by these vulnerabilities. Unfortunately patching is not available for some older (out of service) models of the PRAESIDEO Network Controller. Further details are provided in the Solution and Mitigations section.

The vulnerabilities in PRAESIDEO have been discovered and responsibly disclosed by the external researcher Gjoko Krstic.

Affected Products

  • Bosch PRAESENSA <= 1.10
    • CVE-2020-6776
    • CVE-2020-6777
  • Bosch PRAESIDEO
    • CVE-2020-15688
  • Bosch PRAESIDEO <= 4.41
    • CVE-2020-6776
    • CVE-2020-6777

Solution and Mitigations

Software Updates

The recommended approach is to update the software of the affected Bosch product to the following or later releases: for PRAESIDEO version 4.42 and for PRAESENSA version 1.20.

Please note that for PRAESIDEO the LBB4401/00 and PRS-NCO-B Network Controllers (both of which have reached End of Service) do not support the 4.42 release due to technical limitations. We recommend to apply the mitigation measures described below.

Isolate the system

For PRAESIDEO the recommendation that is already made in the user manual is repeated: it is strongly advised to run PRAESIDEO on an isolated network that is not connected to a public network. Isolating will significantly reduce the odds of having an attacker misuse the vulnerabilities. Note that for the LBB4401/00 and PRS-NCO-B Network Controllers (both of which have reached End of Service) this mitigation will be the only solution since they do not support the 4.42 release due to technical limitations.

The PRAESIDEO user manual contains the following caution:

“The PRAESIDEO network interfaces do not provide extensive security measures to protect the system against malicious network attacks. Such measures would be insufficient on the long term anyway, because PRAESIDEO systems in operation are unlikely to be updated regularly to repair security leaks. Therefore do not keep the network controller permanently connected to an open Ethernet network. When a network connection is needed after configuration, e.g. in case of connection to a PC Call Server or a Logging Server, then use a separate network, not accessible by others, or setup a PRAESIDEO specific VLAN by using Ethernet switches with VLAN capabilities to partition the network into multiple broadcast domains with one domain assigned solely to PRAESIDEO.”

For PRAESENSA we refer to the general security whitepaper of which the steps are also documented in the installation manual. The most important recommendation with respect to these vulnerabilities is:

“It is highly recommended to operate PRAESENSA on its own dedicated network, not mixed with other equipment for other purposes. Other equipment may be accessible by unauthorized people, causing a security risk. This is especially true if the network is connected to the Internet.”

Firewalling (network)

In case the system for some reason must be connected to a public network it is strongly advised to firewall the PRAESIDEO or PRAESENSA system. Firewalling the PRAESIDEO and PRAESENSA systems significantly reduces the attack surface. It is advised not to enable port-forwarding to the PRAESIDEO Network Controller or the PRAESENSA System Controller since that will revert the reduction of the attack surface.

Vulnerability Details

CVE-2020-6776

CVE description: A vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an unauthenticated remote attacker to trigger actions on an affected system on behalf of another user (Cross-Site Request Forgery). This requires the victim to be tricked into clicking a malicious link or submitting a malicious form. A successful exploit allows the attacker to perform arbitrary actions with the privileges of the victim, e.g. creating and modifying user accounts, changing system configuration settings and cause DoS conditions.

Note: For Bosch PRAESIDEO 4.31 and newer and Bosch PRAESENSA in all versions, the confidentiality impact is considered low because user credentials are not shown in the web interface.

CVE-2020-6777

CVE description: A vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an authenticated remote attacker with admin privileges to mount a stored Cross-Site-Scripting (XSS) attack against another user. When the victim logs into the management interface, the stored script code is executed in the context of his browser. A successful exploit would allow an attacker to interact with the management interface with the privileges of the victim. However, as the attacker already needs admin privileges, there is no additional impact on the management interface itself.

CVE-2020-15688

The GoAhead webserver used in Bosch PRAESIDEO does not protect against replay attacks on HTTP Digest Authentication. For PRAESIDEO 4.31 and later, a possible HTTP Digest Authentication capture-replay is limited to 300 seconds (i.e. an attacker must capture and replay within 5 minutes after an authenticated user uses the PRAESIDEO web interface to have the attack succeed). We suggest customers to apply the mitigations described in this advisory since the PRAESIDEO web server does not support TLS/HTTPS.

CVE description: The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.

Remark

Vulnerability classification has been performed using the CVSS v3.1 scoring system . The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.

Additional Resources

Please contact the Bosch PSIRT if you have feedback, comments, or additional information about this vulnerability at: psirt@bosch.com .

Revision History

  • 30 Sep 2020: Initial Publication

Appendix

Material List: Bosch PRAESIDEO

SAP Number CTN Description
F.01U.506.857
LBB4401/00
Network Controller – End of Service reached
F.01U.126.533
PRS-NCO-B
Network Controller – End of Service reached
F.01U.249.771
PRS-NCO3
Network Controller
F.01U.318.441
PRS-NCO3-CN
网络控制器 (Network Controller)

Material List: Bosch PRAESENSA

SAP Number CTN Description
F.01U.325.042
PRA-SCL
System controller, large