Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24351: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Bosch Rexroth AG ctrlX OS - Device Admin

0
High
VulnerabilityCVE-2025-24351cvecve-2025-24351cwe-78
Published: Wed Apr 30 2025 (04/30/2025, 11:47:00 UTC)
Source: CVE
Vendor/Project: Bosch Rexroth AG
Product: ctrlX OS - Device Admin

Description

A vulnerability in the “Remote Logging” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to execute arbitrary OS commands in the context of user “root” via a crafted HTTP request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:58:39 UTC

Technical Analysis

CVE-2025-24351 is an OS command injection vulnerability classified under CWE-78, found in the Remote Logging functionality of the ctrlX OS - Device Admin web application developed by Bosch Rexroth AG. The vulnerability arises from improper neutralization of special elements in user-supplied input that is passed to OS commands. An attacker with low-privileged authenticated access can send specially crafted HTTP requests that inject arbitrary commands executed with root privileges on the underlying operating system. The vulnerability affects ctrlX OS versions 1.20.0 and 2.6.0. The CVSS v3.1 base score is 8.8, indicating high severity, with attack vector being network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The flaw allows full system compromise, potentially enabling attackers to manipulate industrial control systems, disrupt operations, or exfiltrate sensitive data. No public exploits have been reported yet, but the vulnerability is CISA-enriched and published, indicating awareness and potential for future exploitation. The root cause is insufficient input validation or sanitization in the Remote Logging feature, which processes user input insecurely when constructing OS commands. This vulnerability is critical in industrial environments where ctrlX OS is deployed for device administration and automation control.

Potential Impact

The impact of CVE-2025-24351 is severe for organizations using Bosch Rexroth's ctrlX OS in industrial automation and control systems. Exploitation allows attackers to execute arbitrary commands as root, leading to complete system takeover. This can result in unauthorized data access, manipulation or destruction of critical control logic, disruption of industrial processes, and potential safety hazards. The compromise of industrial devices can cascade to broader operational technology (OT) networks, causing widespread downtime and financial losses. Given the root-level access, attackers could install persistent malware, create backdoors, or pivot to other network segments. The vulnerability threatens confidentiality, integrity, and availability of affected systems, undermining trust in industrial automation infrastructure. Organizations may face regulatory and compliance repercussions if safety or data integrity is compromised. The lack of known exploits currently provides a window for proactive mitigation, but the network-exploitable nature and low privilege requirement increase the urgency of response.

Mitigation Recommendations

To mitigate CVE-2025-24351, organizations should immediately identify and upgrade affected ctrlX OS versions to patched releases once available from Bosch Rexroth. Until patches are released, restrict access to the Device Admin web interface by implementing network segmentation and firewall rules limiting access to trusted administrators only. Enforce strong authentication mechanisms and monitor for unusual login or command execution activity. Disable or restrict the Remote Logging functionality if not essential. Employ application-layer firewalls or intrusion detection systems to detect and block suspicious HTTP requests targeting the vulnerable endpoint. Conduct thorough input validation and sanitization on all user inputs in custom integrations or scripts interacting with ctrlX OS. Regularly audit and review system logs for signs of exploitation attempts. Coordinate with Bosch Rexroth support for guidance and updates. Finally, integrate this vulnerability into industrial cybersecurity risk management and incident response plans to ensure rapid detection and containment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
bosch
Date Reserved
2025-01-20T15:09:10.534Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed36d

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 2/26/2026, 8:58:39 PM

Last updated: 3/25/2026, 4:36:36 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses