Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24351: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Bosch Rexroth AG ctrlX OS - Device Admin

0
High
VulnerabilityCVE-2025-24351cvecve-2025-24351cwe-78
Published: Wed Apr 30 2025 (04/30/2025, 11:47:00 UTC)
Source: CVE
Vendor/Project: Bosch Rexroth AG
Product: ctrlX OS - Device Admin

Description

A vulnerability in the “Remote Logging” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to execute arbitrary OS commands in the context of user “root” via a crafted HTTP request.

AI-Powered Analysis

AILast updated: 08/28/2025, 00:35:49 UTC

Technical Analysis

CVE-2025-24351 is a critical vulnerability classified under CWE-78, which pertains to improper neutralization of special elements used in OS command execution, commonly known as OS Command Injection. This specific vulnerability affects the "Remote Logging" functionality of the web application component of Bosch Rexroth AG's ctrlX OS - Device Admin product, versions 1.20.0 and 2.6.0. The flaw allows a remote attacker with low-privileged authenticated access to execute arbitrary operating system commands with root privileges by sending a specially crafted HTTP request. The vulnerability arises because the application fails to properly sanitize or neutralize user-supplied input before incorporating it into OS-level commands, enabling command injection. The CVSS v3.1 base score is 8.8, indicating a high severity rating, with attack vector being network (remote), low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality, integrity, and availability at a high level. Exploitation of this vulnerability could lead to full system compromise, unauthorized data access, data manipulation, or service disruption. Although no known exploits are currently reported in the wild, the presence of root-level command execution capability makes this a significant threat, especially in industrial and automation environments where ctrlX OS is deployed. The vulnerability was published on April 30, 2025, and is recognized by CISA, highlighting its importance in cybersecurity risk management.

Potential Impact

For European organizations, particularly those in industrial automation, manufacturing, and critical infrastructure sectors using Bosch Rexroth's ctrlX OS, this vulnerability poses a substantial risk. Successful exploitation could lead to complete takeover of affected devices, enabling attackers to manipulate industrial processes, disrupt production lines, or exfiltrate sensitive operational data. Given the root-level access achievable, attackers could also pivot within internal networks, compromising additional systems and potentially causing widespread operational outages. This could result in significant financial losses, safety hazards, regulatory non-compliance, and damage to reputation. The impact is especially critical for sectors governed by stringent regulations such as the EU's NIS Directive and GDPR, where data breaches and service disruptions carry heavy penalties. Moreover, the vulnerability's presence in remote logging functionality, which is often exposed for monitoring purposes, increases the attack surface and likelihood of exploitation in distributed industrial environments common in Europe.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately apply any patches or updates provided by Bosch Rexroth once available; 2) Restrict access to the ctrlX OS Device Admin web interface by implementing network segmentation and firewall rules to limit access only to trusted management networks; 3) Enforce strong authentication and authorization policies to minimize the number of users with access, and monitor for anomalous login attempts; 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting the remote logging functionality; 5) Conduct regular security audits and penetration testing focused on the ctrlX OS environment to identify potential exploitation attempts; 6) Implement robust logging and alerting mechanisms to detect unusual command execution or privilege escalation activities; 7) Educate operational technology (OT) personnel about the risks and signs of exploitation to ensure rapid incident response; 8) Consider deploying intrusion detection/prevention systems (IDS/IPS) tailored for industrial control systems to monitor network traffic for exploitation patterns. These measures, combined with vendor patches, will significantly reduce the risk posed by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
bosch
Date Reserved
2025-01-20T15:09:10.534Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed36d

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 8/28/2025, 12:35:49 AM

Last updated: 10/16/2025, 3:16:18 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats