Vulnerability Description
A vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an authenticated remote attacker with admin privileges to mount a stored Cross-Site-Scripting (XSS) attack against another user. When the victim logs into the management interface, the stored script code is executed in the context of his browser. A successful exploit would allow an attacker to interact with the management interface with the privileges of the victim. However, as the attacker already needs admin privileges, there is no additional impact on the management interface itself.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bosch | Praesideo Firmware | <= 4.41 |
| Bosch | Praesideo | - |
| Bosch | Praesensa Firmware | <= 1.10 |
| Bosch | Praesensa | - |
Related Weaknesses (CWE)
References
- https://psirt.bosch.com/security-advisories/bosch-sa-538331-bt.htmlVendor Advisory
- https://psirt.bosch.com/security-advisories/bosch-sa-538331-bt.htmlVendor Advisory
FAQ
What is CVE-2020-6777?
CVE-2020-6777 is a vulnerability with a CVSS score of 4.8 (MEDIUM). A vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an authenticated remote attacker w...
How severe is CVE-2020-6777?
CVE-2020-6777 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-6777?
Check the references section above for vendor advisories and patch information. Affected products include: Bosch Praesideo Firmware, Bosch Praesideo, Bosch Praesensa Firmware, Bosch Praesensa.