Skip to main

Remote Code Execution in RTS VLink Virtual Matrix

BOSCH-SA-893251-BT

Advisory Information

  • Advisory ID: BOSCH-SA-893251-BT
  • CVE Numbers and CVSS v3.1 Scores:
  • Published: 30 Aug 2023
  • Last Updated: 30 Aug 2023

Summary

A security vulnerability has been uncovered in the admin interface of the RTS VLink Virtual Matrix Software. The vulnerability will allow a Remote Code Execution (RCE) attack.

Versions v5 (< 5.7.6) and v6 (< 6.5.0) of the RTS VLink Virtual Matrix Software are affected by this vulnerability. Older versions are not affected.

The vulnerability has been uncovered and disclosed responsibly by an external team of researchers.

Affected Products

  • RTS VLink Virtual Matrix Software on: Windows
    • CVE-2023-34999
      • Version(s): 5.0.0 - 5.7.6 (excluding)
      • Version(s): 6.0.0 - 6.5.0 (excluding)

Solution and Mitigations

Solution

Update the VLink Virtual Matrix Software to version 5.7.6 if you are currently using a v5 version.

Update the VLink Virtual Matrix Software to version 6.5.0 if you are currently using a v6 version.

To ensure the security of your system, we strongly recommend that you update your software to the latest version. Instructions for downloading and updating your system may be found at https://products.rtsintercoms.com/binary/VLink_Upgrade_Instructions.pdf

Mitigations

If updating is not possible it is strongly advised to change the admin password of the RTS VLink Virtual Matrix Software if it is still set to the default password.

Blocking the web interface ports (80 and 443) of the RTS VLink Virtual Matrix Software in a firewall will prevent the vulnerability from being misused from a remote location.

In all cases it is still strongly advised to perform the update as soon as possible since that will remove the vulnerability.

Vulnerability Details

CVE-2023-34999

CVE description: A command injection vulnerability exists in RTS VLink Virtual Matrix Software Versions v5 (< 5.7.6) and v6 (< 6.5.0) that allows an attacker to perform arbitrary code execution via the admin web interface.

Remarks

Security Update Information

With respect to Directive (EU) 2019/770 and Directive (EU) 2019/771 and their national transposition laws, please note:

It is your responsibility to download and/or install any security updates provided by us, for example to maintain product or data security. If you fail to install a security update provided to you within a reasonable period of time, we will not be liable for any product defect solely due to the absence of such security update.

Alternatively, we are entitled to directly download and/or install security updates regardless of your settings. In these cases, we will provide you with the relevant information, e.g. in this security advisory.

CVSS Scoring

Vulnerability classification has been performed using the CVSS v3.1 scoring system . The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.

Additional Resources

Please contact the Bosch PSIRT if you have feedback, comments, or additional information about this vulnerability at: psirt@bosch.com .

Revision History

  • 30 Aug 2023: Initial Publication

Appendix

Material List

Please find the SAP Number and CTN of the affected products below.

SAP Number CTN
F.01U.216.945
VLINK-8
F.01U.216.946
VLINK-8UPG
F.01U.264.751
VLINK-2EXP
F.01U.388.141
VLINK-8REDNT
F.01U.388.142
VLINK-1RENTAL
F.01U.388.143
VLINK-2REDNT
F.01U.388.144
VLINK-8SIP
F.01U.388.145
VLINK-2SIP
F.01U.388.146
VLINK-8SIPREDNT
F.01U.388.148
VLINK-2SIPREDNT
F.01U.393.239
VLINK-SVU
F.01U.393.240
VLINK-Lite
F.01U.393.241
VLINK-LiteUPG
F.01U.393.242
VLINK-VIDEO
F.01U.393.243
VLINK-VIDEO I/O
F.01U.393.244
VLINK-REC
F.01U.393.245
VLINK-ENCRYPT
F.01U.396.977
VLINK-8 SPACE
F.01U.396.978
VLINK-2 EXSPACE