Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60035: CWE-502 Deserialization of Untrusted Data in Bosch Rexroth IndraWorks

0
High
VulnerabilityCVE-2025-60035cvecve-2025-60035cwe-502
Published: Wed Feb 18 2026 (02/18/2026, 14:01:59 UTC)
Source: CVE Database V5
Vendor/Project: Bosch Rexroth
Product: IndraWorks

Description

A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running the OPC.Testclient.

AI-Powered Analysis

AILast updated: 02/18/2026, 14:26:40 UTC

Technical Analysis

CVE-2025-60035 is a deserialization vulnerability classified under CWE-502 found in the OPC.Testclient utility of Bosch Rexroth IndraWorks software. The vulnerability affects all versions prior to 15V24 and arises when the application parses a specially crafted file containing malicious serialized data. When a user opens such a file, the OPC.Testclient deserializes the data without proper validation or sanitization, allowing an attacker to execute arbitrary code on the victim's system. This remote code execution (RCE) can lead to complete system compromise, including unauthorized access, data manipulation, or disruption of industrial control processes. The vulnerability requires user interaction (opening the malicious file) and does not require prior authentication, increasing the attack surface. The CVSS v3.1 score of 7.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no exploits are currently known in the wild, the risk is significant due to the critical nature of industrial automation environments where IndraWorks is deployed. The flaw highlights the dangers of insecure deserialization, a common vector for code injection attacks, especially in software handling complex serialized objects without adequate input validation.

Potential Impact

For European organizations, especially those in manufacturing, industrial automation, and critical infrastructure sectors, this vulnerability poses a significant risk. Bosch Rexroth IndraWorks is widely used in industrial control systems (ICS) and automation environments across Europe. Successful exploitation could lead to unauthorized control over industrial processes, data breaches, operational disruptions, and potential safety hazards. The ability to execute arbitrary code remotely could allow attackers to pivot within networks, compromise sensitive operational technology (OT) environments, and cause downtime or physical damage. Given the reliance on automation in European manufacturing hubs such as Germany, France, and Italy, the impact could extend to supply chain disruptions and economic losses. Additionally, the requirement for user interaction means phishing or social engineering could be leveraged to deliver the malicious files, increasing the threat vector. The absence of known exploits currently provides a window for proactive defense, but the high severity demands urgent attention.

Mitigation Recommendations

1. Immediately update Bosch Rexroth IndraWorks to version 15V24 or later where the vulnerability is patched. 2. Implement strict policies to control and verify the source of files opened by OPC.Testclient, including disabling the opening of files from untrusted or external sources. 3. Employ application whitelisting and endpoint protection solutions that can detect and block suspicious deserialization behaviors or execution of unauthorized code. 4. Conduct user awareness training focused on recognizing and avoiding phishing attempts or suspicious files that could trigger exploitation. 5. Monitor network and host logs for unusual activity related to OPC.Testclient usage, including unexpected process launches or file accesses. 6. Segment industrial networks to limit lateral movement if a compromise occurs. 7. Consider deploying runtime application self-protection (RASP) or sandboxing techniques to contain potential exploits. 8. Engage with Bosch Rexroth support for any additional recommended security configurations or patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
bosch
Date Reserved
2025-09-25T12:06:05.896Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6995c8856aea4a407a9d0cf4

Added to database: 2/18/2026, 2:11:17 PM

Last enriched: 2/18/2026, 2:26:40 PM

Last updated: 2/21/2026, 12:22:06 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats