CVE-2025-48860: CWE-284 Improper Access Control in Bosch Rexroth AG ctrlX OS - Setup
A vulnerability in the web application of the ctrlX OS setup mechanism facilitated an authenticated (low privileged) attacker to gain remote access to backup archives created by a user with elevated permissions. Depending on the content of the backup archive, the attacker may have been able to access sensitive data.
AI Analysis
Technical Summary
CVE-2025-48860 is a vulnerability identified in the web application component of Bosch Rexroth AG's ctrlX OS Setup mechanism, affecting versions 1.20.0, 2.6.0, and 3.6.0. The flaw arises from improper access control (CWE-284), allowing an attacker with low-level authenticated access to remotely retrieve backup archives generated by users with higher privileges. These backup archives potentially contain sensitive configuration data or credentials, which if accessed, could compromise system confidentiality and integrity. The vulnerability requires the attacker to be authenticated with low privileges and involves user interaction, but no elevated privileges are needed initially. The CVSS v3.1 base score of 8.0 reflects the high impact on confidentiality, integrity, and availability, with network attack vector and low attack complexity. Although no known exploits are currently in the wild, the risk is significant due to the sensitive nature of the data exposed and the critical role of ctrlX OS in industrial automation environments. The vulnerability could enable lateral movement within networks, data exfiltration, or disruption of industrial control systems. Bosch Rexroth has not yet published patches, so mitigation relies on access restrictions and monitoring. This vulnerability highlights the importance of strict access controls in industrial IoT and automation platforms.
Potential Impact
The impact of CVE-2025-48860 is substantial for organizations using Bosch Rexroth ctrlX OS in industrial automation and manufacturing environments. Unauthorized access to backup archives containing sensitive configuration data or credentials can lead to confidentiality breaches, enabling attackers to gather intelligence for further attacks or sabotage. Integrity of the system could be compromised if attackers manipulate backup data or use obtained credentials to alter system configurations. Availability may also be affected if attackers disrupt backup or restore processes. The vulnerability facilitates lateral movement within networks, increasing the attack surface. Given the critical role of ctrlX OS in controlling industrial machinery, exploitation could result in operational disruptions, safety hazards, and financial losses. The requirement for low-privileged authentication lowers the barrier for exploitation, increasing risk. Organizations globally that rely on Bosch Rexroth automation solutions face potential exposure until patches are released and applied.
Mitigation Recommendations
To mitigate CVE-2025-48860, organizations should implement the following specific measures: 1) Immediately restrict access to the ctrlX OS Setup web interface to trusted administrators only, using network segmentation and firewall rules. 2) Enforce strong authentication and authorization policies to limit low-privileged user access to the setup mechanism. 3) Monitor access logs and network traffic for unusual attempts to retrieve backup archives or access the setup interface. 4) Disable or remove unnecessary backup creation features if possible until patches are available. 5) Coordinate with Bosch Rexroth for timely updates and apply security patches as soon as they are released. 6) Conduct regular audits of backup archives to ensure they do not contain excessive sensitive data. 7) Educate users about the risk of social engineering or phishing that could lead to low-privileged account compromise. 8) Employ intrusion detection systems tailored to industrial control environments to detect lateral movement attempts. These targeted actions go beyond generic advice by focusing on access control hardening, monitoring, and operational hygiene specific to the ctrlX OS environment.
Affected Countries
Germany, United States, China, Japan, South Korea, France, Italy, United Kingdom, Canada, Netherlands
CVE-2025-48860: CWE-284 Improper Access Control in Bosch Rexroth AG ctrlX OS - Setup
Description
A vulnerability in the web application of the ctrlX OS setup mechanism facilitated an authenticated (low privileged) attacker to gain remote access to backup archives created by a user with elevated permissions. Depending on the content of the backup archive, the attacker may have been able to access sensitive data.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-48860 is a vulnerability identified in the web application component of Bosch Rexroth AG's ctrlX OS Setup mechanism, affecting versions 1.20.0, 2.6.0, and 3.6.0. The flaw arises from improper access control (CWE-284), allowing an attacker with low-level authenticated access to remotely retrieve backup archives generated by users with higher privileges. These backup archives potentially contain sensitive configuration data or credentials, which if accessed, could compromise system confidentiality and integrity. The vulnerability requires the attacker to be authenticated with low privileges and involves user interaction, but no elevated privileges are needed initially. The CVSS v3.1 base score of 8.0 reflects the high impact on confidentiality, integrity, and availability, with network attack vector and low attack complexity. Although no known exploits are currently in the wild, the risk is significant due to the sensitive nature of the data exposed and the critical role of ctrlX OS in industrial automation environments. The vulnerability could enable lateral movement within networks, data exfiltration, or disruption of industrial control systems. Bosch Rexroth has not yet published patches, so mitigation relies on access restrictions and monitoring. This vulnerability highlights the importance of strict access controls in industrial IoT and automation platforms.
Potential Impact
The impact of CVE-2025-48860 is substantial for organizations using Bosch Rexroth ctrlX OS in industrial automation and manufacturing environments. Unauthorized access to backup archives containing sensitive configuration data or credentials can lead to confidentiality breaches, enabling attackers to gather intelligence for further attacks or sabotage. Integrity of the system could be compromised if attackers manipulate backup data or use obtained credentials to alter system configurations. Availability may also be affected if attackers disrupt backup or restore processes. The vulnerability facilitates lateral movement within networks, increasing the attack surface. Given the critical role of ctrlX OS in controlling industrial machinery, exploitation could result in operational disruptions, safety hazards, and financial losses. The requirement for low-privileged authentication lowers the barrier for exploitation, increasing risk. Organizations globally that rely on Bosch Rexroth automation solutions face potential exposure until patches are released and applied.
Mitigation Recommendations
To mitigate CVE-2025-48860, organizations should implement the following specific measures: 1) Immediately restrict access to the ctrlX OS Setup web interface to trusted administrators only, using network segmentation and firewall rules. 2) Enforce strong authentication and authorization policies to limit low-privileged user access to the setup mechanism. 3) Monitor access logs and network traffic for unusual attempts to retrieve backup archives or access the setup interface. 4) Disable or remove unnecessary backup creation features if possible until patches are available. 5) Coordinate with Bosch Rexroth for timely updates and apply security patches as soon as they are released. 6) Conduct regular audits of backup archives to ensure they do not contain excessive sensitive data. 7) Educate users about the risk of social engineering or phishing that could lead to low-privileged account compromise. 8) Employ intrusion detection systems tailored to industrial control environments to detect lateral movement attempts. These targeted actions go beyond generic advice by focusing on access control hardening, monitoring, and operational hygiene specific to the ctrlX OS environment.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- bosch
- Date Reserved
- 2025-05-27T10:45:32.638Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689da9bdad5a09ad00592733
Added to database: 8/14/2025, 9:17:49 AM
Last enriched: 2/27/2026, 2:54:58 AM
Last updated: 3/22/2026, 8:02:21 AM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.