Software catalogue for Bosh

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › Bosh

Software catalogue for Bosh

AMC2 B426 B426-CN/B429 B426-M BCC101 BCC102 BCC50 Bosch Network Synchronizer Enterprise Bosch Network Synchronizer Standard Bosch Remote Programing Software (RPS Lite)
Bosch Remote Programing Software (RPS) IndraDrive MAP 5000 family PRA-ES8P2S PRC7000 Rexroth IndraWorks Rexroth UA.Testclient


Latest security bulletins

Secuity bulletin Severity Status Published
SB20260213133: Multiple vulnerabilities in Bosch Rexroth IndraWorks and Rexroth UA.Testclient High
Not patched
13.02.2026
SB2025112007: Inadequate Encryption Strength in Bosch MAP 5000 family Medium
Patched
20.11.2025
SB2025111933: Use of a broken or risky cryptographic algorithm in Bosch MAP 5000 family High
Patched
19.11.2025
SB2024110129: Denial of service in Bosch IndraDrive High
Patched
01.11.2024
SB2024072616: Race condition in Bosch PRC7000 High
Patched Public exploit
26.07.2024
SB2024032125: OS Command Injection in Bosch Network Synchronizer Medium
Patched
21.03.2024
SB2024031341: Multiple vulnerabilities in Bosch Remote Programing Software Medium
Patched
13.03.2024
SB2024011606: Missing authorization in Bosh BCC thermostat products Medium
Patched
16.01.2024
SB2022062718: Multiple vulnerabilities in Bosch Ethernet switch PRA-ES8P2S High
Patched
27.06.2022
SB2021060406: Cleartext transmission of sensitive information in Bosch B426 Medium
Not patched
04.06.2021

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or