Skip to main

Injection of arbitrary HTML code in Bosch Video Security Android App


Advisory Information

  • Advisory ID: BOSCH-SA-844050-BT
  • CVE Numbers and CVSS v3.1 Scores:
  • Published: 26 Jan 2022
  • Last Updated: 26 Jan 2022


A vulnerability was recently discovered in the Android Application Bosch Video Security that allows an attacker to inject random HTML code into a WebView object. This vulnerability could for example allow the loading of malicious forms that could lead to the theft of the user's private information.

This vulnerability was discovered by Sergey Toshin of Oversecured.

For more details please see the description of the vulnerabilities in this advisory.

Bosch rates this vulnerability using the CVSS 3.1 framework with a score of 6.1 (Medium).

Affected Products

  • Bosch Video Security Android Application < 3.2.4

Solution and Mitigations

Software Updates

The recommended approach is to update the affected Bosch software to a fixed version. In this particular case, the user should verify that the Android Application is in the latest stable version, 3.2.4. This information can be consulted by accessing the Application settings menu.

Vulnerability Details


CVE description: HTML code injection vulnerability in Android Application, Bosch Video Security, version 3.2.3. or earlier, when successfully exploited allows an attacker to inject random HTML code into a component loaded by WebView, thus allowing the Application to display web resources controlled by the attacker.


Vulnerability classification has been performed using the CVSS v3.1 scoring system . The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.

Additional Resources

Please contact the Bosch PSIRT if you have feedback, comments, or additional information about this vulnerability at: .

Revision History

  • 26 Jan 2022: Initial Publication