Injection of arbitrary HTML code in Bosch Video Security Android App
BOSCH-SA-844050-BT
Advisory Information
- Advisory ID: BOSCH-SA-844050-BT
- CVE Numbers and CVSS v3.1 Scores:
- CVE-2021-23863
- Base Score: 6.1 (Medium)
- CVE-2021-23863
- Published: 26 Jan 2022
- Last Updated: 26 Jan 2022
Summary
A vulnerability was recently discovered in the Android Application Bosch Video Security that allows an attacker to inject random HTML code into a WebView object. This vulnerability could for example allow the loading of malicious forms that could lead to the theft of the user's private information.
This vulnerability was discovered by Sergey Toshin of Oversecured.
For more details please see the description of the vulnerabilities in this advisory.
Bosch rates this vulnerability using the CVSS 3.1 framework with a score of 6.1 (Medium).
Affected Products
- Bosch Video Security Android Application < 3.2.4
Solution and Mitigations
Software Updates
The recommended approach is to update the affected Bosch software to a fixed version. In this particular case, the user should verify that the Android Application is in the latest stable version, 3.2.4. This information can be consulted by accessing the Application settings menu.
Vulnerability Details
CVE-2021-23863
CVE description: HTML code injection vulnerability in Android Application, Bosch Video Security, version 3.2.3. or earlier, when successfully exploited allows an attacker to inject random HTML code into a component loaded by WebView, thus allowing the Application to display web resources controlled by the attacker.
- Problem Type:
- CVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Base Score: 6.1 (Medium)
Remark
Vulnerability classification has been performed using the CVSS v3.1 scoring system . The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.
Additional Resources
- [1] Google Play - Bosch Video Security: https://play.google.com/store/apps/details?id=com.bosch.onsite
Please contact the Bosch PSIRT if you have feedback, comments, or additional information about this vulnerability at: psirt@bosch.com .
Revision History
- 26 Jan 2022: Initial Publication