漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
CSRF in Bosch PRAESIDEO and Bosch PRAESENSA Management Interface
漏洞信息
A vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an unauthenticated remote attacker to trigger actions on an affected system on behalf of another user (Cross-Site Request Forgery). This requires the victim to be tricked into clicking a malicious link or submitting a malicious form. A successful exploit allows the attacker to perform arbitrary actions with the privileges of the victim, e.g. creating and modifying user accounts, changing system configuration settings and cause DoS conditions. Note: For Bosch PRAESIDEO 4.31 and newer and Bosch PRAESENSA in all versions, the confidentiality impact is considered low because user credentials are not shown in the web interface.
漏洞信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
漏洞
跨站请求伪造(CSRF)
漏洞
Bosch PRAESIDEO 和 Bosch PRAESENSA 跨站请求伪造漏洞
漏洞信息
Bosch Praesideo和Bosch Praesensa都是德国博世(Bosch)公司的产品。Bosch Praesideo是一款应用于公共场合的数字广播的设备。该设备可为建筑、公共场合提供日常发布信息、紧急广播、火灾报警等功能。Bosch Praesensa是一款IP公共广播与语音报警设备。 Bosch PRAESIDEO 4.41版本及之前版本 和 Bosch PRAESENSA 1.10版本及之前版本存在跨站请求伪造漏洞,允许未经身份验证的远程攻击者使用受害者的权限与管理界面进行交互。
漏洞信息
N/A
漏洞
N/A