By executing a special command, an user with administrative rights can get access to extended debug functionality on the VRM allowing an impact on integrity or availability of the installed software. This issue also affects installations of the DIVAR IP and BVMS with VRM installed.
Published 2021-12-08 22:15:09
Updated 2022-08-30 18:18:23
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2021-23861

Probability of exploitation activity in the next 30 days: 0.08%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 34 % EPSS Score History EPSS FAQ

CVSS scores for CVE-2021-23861

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
5.5
MEDIUM AV:N/AC:L/Au:S/C:N/I:P/A:P
8.0
4.9
NIST
6.5
MEDIUM CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1.2
5.2
NIST
6.5
MEDIUM CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1.2
5.2
Robert Bosch GmbH

CWE ids for CVE-2021-23861

  • The product is deployed to unauthorized actors with debugging code still enabled or active, which can create unintended entry points or expose sensitive information.
    Assigned by: psirt@bosch.com (Secondary)

References for CVE-2021-23861

Products affected by CVE-2021-23861

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!