Bosch Security Systems B426 Conettix Cleartext Transmission of Sensitive Information (CVE-2021-23846)

medium Tenable OT Security Plugin ID 501997

Synopsis

The remote OT asset is affected by a vulnerability.

Description

When using http protocol, the user password is transmitted as a clear text parameter for which it is possible to be obtained by an attacker through a MITM attack. This will be fixed starting from Firmware version 3.11.5, which will be released on the 30th of June, 2021.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The recommended approach is to update the software of affected Bosch products to a fixed version. If an update is not possible in a timely manner, the mitigation approaches Firewalling and IP Filtering can be utilized. A list of affected and fixed firmware versions is available in the 'Affected Products' section of the vendor advisory.

It is advised that the devices should not be exposed directly to the internet or other insecure networks. This includes port-forwarding, which would not protect devices adequately. Firewalling a device significantly reduces its attack surface.

See Also

https://psirt.bosch.com/security-advisories/bosch-sa-196933-bt.html

Plugin Details

Severity: Medium

ID: 501997

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 2/14/2024

Updated: 2/15/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2021-23846

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:bosch:b426_firmware:03.01.0004, cpe:/o:bosch:b426_firmware:03.02.002, cpe:/o:bosch:b426_firmware:03.03.0009, cpe:/o:bosch:b426_firmware:03.05.0003

Required KB Items: Tenable.ot/BoschSecuritySystems

Exploit Ease: No known exploits are available

Patch Publication Date: 6/18/2021

Vulnerability Publication Date: 6/18/2021

Reference Information

CVE: CVE-2021-23846

CWE: 319