{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-33618","assignerOrgId":"c95f66b2-7e7c-41c5-8f09-6f86ec68659c","state":"PUBLISHED","assignerShortName":"bosch","dateReserved":"2024-06-17T09:19:04.535Z","datePublished":"2026-04-15T09:51:52.722Z","dateUpdated":"2026-04-15T13:09:13.468Z"},"containers":{"cna":{"providerMetadata":{"orgId":"c95f66b2-7e7c-41c5-8f09-6f86ec68659c","shortName":"bosch","dateUpdated":"2026-04-15T09:51:52.722Z"},"descriptions":[{"lang":"en","value":"Uncontrolled Resource Consumption in Bosch VMS Central Server in Bosch VMS 12.0.1 \r\nallows attackers to consume excessive amounts of disk space via network interface."}],"affected":[{"vendor":"Bosch","product":"BVMS","versions":[{"version":"6.0","status":"affected","versionType":"custom","lessThanOrEqual":"12.0.1"}]},{"vendor":"Bosch","product":"BVMS Viewer","versions":[{"version":"8.0","status":"affected","versionType":"custom","lessThanOrEqual":"12.0.1"}]},{"vendor":"Bosch","product":"Bosch DIVAR IP all-in-one 7000 R3","versions":[{"version":"10.1","status":"affected","versionType":"custom","lessThanOrEqual":"12.0.1"}]},{"vendor":"Bosch","product":"Bosch DIVAR IP 7000 R2","versions":[{"version":"9.0","status":"affected","versionType":"custom","lessThanOrEqual":"12.0.1"}]},{"vendor":"Bosch","product":"Bosch DIVAR IP all-in-one 5000","versions":[{"version":"9.0","status":"affected","versionType":"custom","lessThanOrEqual":"12.0.1"}]},{"vendor":"Bosch","product":"Bosch DIVAR IP all-in-one 7000","versions":[{"version":"6.0","status":"affected","versionType":"custom","lessThanOrEqual":"12.0.1"}]},{"vendor":"Bosch","product":"DIVAR IP all-in-one 4000","versions":[{"version":"11.1.1","status":"affected","versionType":"custom","lessThanOrEqual":"12.0.1"}]},{"vendor":"Bosch","product":"DIVAR IP all-in-one 6000","versions":[{"version":"11.1.1","status":"affected","versionType":"custom","lessThanOrEqual":"12.0.1"}]}],"problemTypes":[{"descriptions":[{"lang":"en-US","description":"CWE-400 Uncontrolled Resource Consumption","cweId":"CWE-400"}]}],"references":[{"url":"https://psirt.bosch.com/security-advisories/BOSCH-SA-162032-BT.html","name":"https://psirt.bosch.com/security-advisories/BOSCH-SA-162032-BT.html","tags":["vendor-advisory"]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-15T13:09:08.201665Z","id":"CVE-2024-33618","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-15T13:09:13.468Z"}}]}}