#VU87504 Weak password requirements in Bosch Remote Programing Software (RPS) and Bosch Remote Programing Software (RPS Lite) - CVE-2023-49267


Vulnerability identifier: #VU87504

Vulnerability risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-49267

CWE-ID: CWE-521

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Bosch Remote Programing Software (RPS)
Client/Desktop applications / Other client software
Bosch Remote Programing Software (RPS Lite)
Client/Desktop applications / Other client software

Vendor: Bosh

Description

The vulnerability allows a local attacker to perform brute-force attack and guess the password.

The vulnerability exists due to weak password requirements. A local attacker can perform a brute-force attack and guess users' passwords.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Bosch Remote Programing Software (RPS): before 6.14.100

Bosch Remote Programing Software (RPS Lite): before 6.14.100


External links
https://psirt.bosch.com/security-advisories/bosch-sa-099637-bt.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability