{"vulnerability": "CVE-2021-2385", "sightings": [{"uuid": "a3d97099-4889-4bf4-82e8-1c31966b5edd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23859", "type": "seen", "source": "https://t.me/cibsecurity/33654", "content": "\u203c CVE-2021-23859 \u203c\n\nAn unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-09T00:24:02.000000Z"}, {"uuid": "6266f437-c31d-410f-871e-81df2f955710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23858", "type": "seen", "source": "https://t.me/cibsecurity/29926", "content": "\u203c CVE-2021-23857 \u203c\n\nLogin with hash: The login routine allows the client to log in to the system not by using the password, but by using the hash of the password. Combined with CVE-2021-23858, this allows an attacker to subsequently login to the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-04T22:25:06.000000Z"}, {"uuid": "c47c7d29-2665-4178-8dba-9f19907b126c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23857", "type": "seen", "source": "https://t.me/cibsecurity/29926", "content": "\u203c CVE-2021-23857 \u203c\n\nLogin with hash: The login routine allows the client to log in to the system not by using the password, but by using the hash of the password. Combined with CVE-2021-23858, this allows an attacker to subsequently login to the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-04T22:25:06.000000Z"}, {"uuid": "c4d979c7-5e31-4710-8492-46053e48dc0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23859", "type": "seen", "source": "https://t.me/VulnerabilityNews/25561", "content": "An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859\nPublished at: December 08, 2021 at 11:15PM\nView on website", "creation_timestamp": "2021-12-09T00:42:44.000000Z"}]}