The vulnerability allows an unprivileged (untrusted) third- party application to arbitrary modify the server settings of the Android Client application, inducing it to connect to an attacker - controlled malicious server.This is possible by forging a valid broadcast intent encrypted with a hardcoded RSA key pair
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html | mitigation vendor advisory |