CVE-2019-11896
low-risk
Published 2019-05-29
A potential incorrect privilege assignment vulnerability exists in the 3rd party pairing mechanism of the Bosch Smart Home Controller (SHC) before 9.8.907 that may result in a restricted app obtaining default app permissions. In order to exploit the vulnerability, the adversary needs to have successfully paired an app, which requires user interaction.
Do I need to act?
-
0.16% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.1/10
High
ADJACENT_NETWORK
/ HIGH complexity
Affected Products (1)
Smart Home Controller Firmware
Affected Vendors
References (2)
Vendor Advisory
https://psirt.bosch.com/Advisory/BOSCH-SA-662084.html
Vendor Advisory
https://psirt.bosch.com/Advisory/BOSCH-SA-662084.html
24
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal