Skip to main content

CVE-2025-48861: CWE-284 Improper Access Control in Bosch Rexroth AG ctrlX OS - Setup

Medium
VulnerabilityCVE-2025-48861cvecve-2025-48861cwe-284
Published: Thu Aug 14 2025 (08/14/2025, 09:07:24 UTC)
Source: CVE Database V5
Vendor/Project: Bosch Rexroth AG
Product: ctrlX OS - Setup

Description

A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps.

AI-Powered Analysis

AILast updated: 08/14/2025, 09:34:24 UTC

Technical Analysis

CVE-2025-48861 is a medium-severity vulnerability identified in the ctrlX OS - Setup component developed by Bosch Rexroth AG. The vulnerability stems from improper access control (CWE-284) in the Task API endpoint of the setup mechanism. Specifically, this flaw allows a remote attacker to access the API without any authentication or user interaction, enabling them to retrieve internal application data. The exposed data may include debug logs and version information of installed applications. These details, while not directly compromising system integrity or availability, could provide valuable intelligence to an attacker for further exploitation or reconnaissance. The affected versions are 1.20.0, 2.6.0, and 3.6.0 of the ctrlX OS - Setup. The CVSS v3.1 base score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, and the impact is limited to confidentiality, with no direct impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed on August 14, 2025, with the initial reservation date in May 2025.

Potential Impact

For European organizations, especially those in industrial automation and manufacturing sectors using Bosch Rexroth's ctrlX OS platform, this vulnerability poses a risk of information leakage. The ctrlX OS is used in industrial control systems (ICS) and automation environments, where exposure of debug logs and version information can aid attackers in crafting targeted attacks or identifying further vulnerabilities. Although the vulnerability does not allow direct system control or disruption, the leaked information could facilitate lateral movement or privilege escalation attempts. This is particularly critical for organizations operating critical infrastructure or manufacturing plants, where operational continuity and data confidentiality are paramount. The lack of authentication and user interaction requirements increases the risk of automated scanning and exploitation attempts, potentially leading to broader reconnaissance campaigns against European industrial networks.

Mitigation Recommendations

Organizations should immediately audit their deployments of Bosch Rexroth ctrlX OS - Setup to identify affected versions (1.20.0, 2.6.0, 3.6.0). Until official patches are released, network-level mitigations should be implemented, such as restricting access to the Task API endpoint via firewall rules or network segmentation, limiting exposure to trusted management networks only. Monitoring and logging access to the Task API endpoint should be enhanced to detect anomalous or unauthorized requests. Additionally, organizations should engage with Bosch Rexroth support channels to obtain patches or updates as soon as they become available. Implementing strict access control policies and ensuring that setup interfaces are not exposed to untrusted networks will reduce the attack surface. Finally, conducting internal penetration testing focused on this endpoint can help validate the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
bosch
Date Reserved
2025-05-27T10:45:32.638Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689da9bdad5a09ad00592736

Added to database: 8/14/2025, 9:17:49 AM

Last enriched: 8/14/2025, 9:34:24 AM

Last updated: 8/14/2025, 3:48:54 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats