Skip to main content

CVE-2025-24351: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Bosch Rexroth AG ctrlX OS - Device Admin

High
VulnerabilityCVE-2025-24351cvecve-2025-24351cwe-78
Published: Wed Apr 30 2025 (04/30/2025, 11:47:00 UTC)
Source: CVE
Vendor/Project: Bosch Rexroth AG
Product: ctrlX OS - Device Admin

Description

A vulnerability in the “Remote Logging” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to execute arbitrary OS commands in the context of user “root” via a crafted HTTP request.

AI-Powered Analysis

AILast updated: 06/25/2025, 15:02:37 UTC

Technical Analysis

CVE-2025-24351 is a high-severity OS command injection vulnerability identified in the Remote Logging functionality of the web application component of Bosch Rexroth AG's ctrlX OS - Device Admin. This vulnerability arises due to improper neutralization of special elements used in OS commands (CWE-78), allowing a remote attacker with low-privileged authenticated access to execute arbitrary operating system commands with root-level privileges. The vulnerability affects ctrlX OS versions 1.20.0 and 2.6.0. Exploitation requires no user interaction beyond authentication, and the attack vector is network-based (remote). The attacker crafts a specially formed HTTP request that leverages the inadequate input sanitization in the Remote Logging feature to inject OS commands. Successful exploitation compromises confidentiality, integrity, and availability of the affected system, as the attacker gains root-level command execution capabilities. The CVSS v3.1 base score is 8.8, reflecting the high impact and relatively low attack complexity (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). No known exploits are currently reported in the wild, but the vulnerability's nature and impact make it a critical concern for industrial control systems and automation environments using ctrlX OS. Bosch Rexroth AG is a prominent supplier of industrial automation and control solutions, and ctrlX OS is a real-time operating system designed for industrial devices, making this vulnerability particularly relevant to operational technology (OT) environments.

Potential Impact

For European organizations, especially those operating in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant risk. Exploitation could lead to full system compromise of devices running ctrlX OS, enabling attackers to disrupt industrial processes, manipulate control logic, exfiltrate sensitive operational data, or cause denial of service. Given the root-level access gained, attackers could pivot within OT networks, potentially affecting broader production environments and supply chains. The impact extends to safety-critical systems where unauthorized command execution might cause physical damage or safety hazards. The confidentiality breach risks exposing proprietary manufacturing data or intellectual property. Integrity violations could result in altered control commands, leading to faulty operations. Availability impacts could halt production lines or critical infrastructure services, causing financial losses and reputational damage. The vulnerability's presence in a widely used industrial OS in Europe amplifies the threat, especially as many European countries have strong manufacturing and industrial sectors relying on Bosch Rexroth solutions.

Mitigation Recommendations

1. Immediate patching: Although no official patches are listed yet, organizations should monitor Bosch Rexroth advisories closely and apply updates as soon as they become available. 2. Restrict access: Limit access to the ctrlX OS Device Admin web interface to trusted networks only, using network segmentation and firewall rules to reduce exposure. 3. Enforce strong authentication: Since exploitation requires authentication, implement multi-factor authentication (MFA) and enforce strong password policies to reduce the risk of credential compromise. 4. Monitor and audit: Enable detailed logging and continuous monitoring of Remote Logging activities and web interface access to detect anomalous or suspicious commands or requests. 5. Use application-layer filtering: Deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block command injection patterns targeting the Remote Logging feature. 6. Limit privileges: Where possible, run the Device Admin service with the least privileges necessary to reduce the impact of potential exploitation. 7. Incident response readiness: Prepare and test incident response plans specific to OT environments to quickly contain and remediate any exploitation attempts. 8. Vendor engagement: Engage with Bosch Rexroth support for guidance and early access to patches or mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
bosch
Date Reserved
2025-01-20T15:09:10.534Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed36d

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 3:02:37 PM

Last updated: 8/17/2025, 1:00:49 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats