Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24346: CWE-1286 Improper Validation of Syntactic Correctness of Input in Bosch Rexroth AG ctrlX OS - Device Admin

0
High
VulnerabilityCVE-2025-24346cvecve-2025-24346cwe-1286
Published: Wed Apr 30 2025 (04/30/2025, 11:39:42 UTC)
Source: CVE
Vendor/Project: Bosch Rexroth AG
Product: ctrlX OS - Device Admin

Description

A vulnerability in the “Proxy” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to manipulate the “/etc/environment” file via a crafted HTTP request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:58:22 UTC

Technical Analysis

CVE-2025-24346 is a vulnerability identified in the Proxy functionality of the ctrlX OS Device Admin web application developed by Bosch Rexroth AG. The flaw stems from improper validation of the syntactic correctness of input (CWE-1286), which allows a remote attacker with low-privileged authenticated access to craft HTTP requests that manipulate the /etc/environment file on the device. The /etc/environment file is critical as it defines environment variables that can influence system behavior and security. By altering this file, an attacker can escalate privileges, execute arbitrary code, or disrupt system operations. The vulnerability affects multiple versions of ctrlX OS (1.12.0, 1.20.0, and 2.6.0), indicating a broad attack surface. The CVSS v3.1 score is 7.5 (high), reflecting network attack vector, high impact on confidentiality, integrity, and availability, and the requirement for low privileges but no user interaction. Although no exploits are currently known in the wild, the potential for severe impact in industrial control systems is significant given the role of ctrlX OS in automation. The vulnerability was published on April 30, 2025, and has been enriched by CISA, highlighting its importance in critical infrastructure security.

Potential Impact

The impact of CVE-2025-24346 is substantial for organizations using Bosch Rexroth's ctrlX OS in industrial automation and control environments. Successful exploitation can lead to unauthorized modification of environment variables, enabling privilege escalation, persistent backdoors, or disruption of critical industrial processes. This can compromise the confidentiality of sensitive operational data, integrity of control commands, and availability of automation systems, potentially causing production downtime, safety hazards, or financial losses. Given the widespread use of ctrlX OS in manufacturing and industrial sectors, the vulnerability poses a risk to critical infrastructure globally. Attackers with low-privileged credentials could leverage this flaw to gain deeper access, bypass security controls, and manipulate system behavior without requiring user interaction, increasing the risk of stealthy and persistent attacks.

Mitigation Recommendations

To mitigate CVE-2025-24346, organizations should implement the following specific measures: 1) Restrict access to the ctrlX OS Device Admin web interface using network segmentation, firewall rules, and VPNs to limit exposure to trusted personnel only. 2) Enforce strong authentication and authorization policies to minimize the risk of low-privileged credential compromise. 3) Monitor HTTP request logs for unusual or malformed requests targeting the Proxy functionality, especially those attempting to modify system files like /etc/environment. 4) Apply vendor patches or updates promptly once released, as no patches are currently available. 5) Conduct regular security audits and penetration tests focusing on web application input validation and privilege escalation vectors. 6) Implement host-based intrusion detection systems (HIDS) to detect unauthorized changes to critical files such as /etc/environment. 7) Educate operational technology (OT) staff about the risks of this vulnerability and best practices for secure device administration.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
bosch
Date Reserved
2025-01-20T15:09:10.532Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed365

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 2/26/2026, 8:58:22 PM

Last updated: 3/23/2026, 5:59:21 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses