CVE-2025-60038: CWE-502 Deserialization of Untrusted Data in Bosch Rexroth IndraWorks
A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running Rexroth IndraWorks.
AI Analysis
Technical Summary
CVE-2025-60038 is a deserialization vulnerability classified under CWE-502 found in all versions of Bosch Rexroth IndraWorks, a software suite widely used for industrial automation and control. The vulnerability occurs because the application deserializes data from files without proper validation or sanitization, allowing an attacker to craft a malicious serialized object that, when deserialized, executes arbitrary code on the victim's system. Exploitation requires the victim to open a specially crafted file, making user interaction mandatory but no authentication necessary. The vulnerability enables Remote Code Execution (RCE), which can lead to complete system compromise, including unauthorized access, data manipulation, and disruption of industrial processes. The CVSS v3.1 score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) indicates that the attack vector is local (user must open a file), with low attack complexity, no privileges required, but user interaction needed, and the impact on confidentiality, integrity, and availability is high. Although no exploits are currently known in the wild, the severity and potential impact on critical industrial environments make this a significant threat. The lack of available patches at the time of publication necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
For European organizations, especially those in manufacturing, automotive, and industrial automation sectors, this vulnerability poses a significant risk. IndraWorks is commonly deployed in industrial control systems (ICS) and operational technology (OT) environments, where a successful RCE can lead to operational disruptions, safety hazards, intellectual property theft, and potential physical damage. The compromise of systems running IndraWorks could allow attackers to manipulate industrial processes, cause downtime, and breach sensitive data. Given the critical role of Bosch Rexroth products in European industry, the impact extends beyond IT to physical and economic domains. Additionally, the requirement for user interaction means that social engineering or phishing campaigns could be used to deliver the malicious files, increasing the attack surface. The high confidentiality, integrity, and availability impact could also affect compliance with European regulations such as NIS2 and GDPR if sensitive data or critical infrastructure is involved.
Mitigation Recommendations
1. Immediately educate users about the risks of opening unsolicited or unexpected files, especially those related to IndraWorks. 2. Implement strict file validation and sandboxing mechanisms to analyze files before they are opened by IndraWorks. 3. Employ endpoint protection solutions capable of detecting and blocking malicious serialized objects or unusual application behaviors. 4. Segment industrial networks to isolate systems running IndraWorks from general IT networks and limit exposure. 5. Monitor logs and network traffic for suspicious activity indicative of exploitation attempts. 6. Coordinate with Bosch Rexroth for timely patch deployment once available; in the meantime, consider disabling or restricting file import features if feasible. 7. Use application whitelisting to prevent unauthorized code execution. 8. Conduct regular security awareness training focusing on social engineering tactics that could deliver malicious files. 9. Maintain up-to-date backups of critical systems to enable recovery in case of compromise.
Affected Countries
Germany, Italy, France, Poland, Spain, Czech Republic, Netherlands
CVE-2025-60038: CWE-502 Deserialization of Untrusted Data in Bosch Rexroth IndraWorks
Description
A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running Rexroth IndraWorks.
AI-Powered Analysis
Technical Analysis
CVE-2025-60038 is a deserialization vulnerability classified under CWE-502 found in all versions of Bosch Rexroth IndraWorks, a software suite widely used for industrial automation and control. The vulnerability occurs because the application deserializes data from files without proper validation or sanitization, allowing an attacker to craft a malicious serialized object that, when deserialized, executes arbitrary code on the victim's system. Exploitation requires the victim to open a specially crafted file, making user interaction mandatory but no authentication necessary. The vulnerability enables Remote Code Execution (RCE), which can lead to complete system compromise, including unauthorized access, data manipulation, and disruption of industrial processes. The CVSS v3.1 score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) indicates that the attack vector is local (user must open a file), with low attack complexity, no privileges required, but user interaction needed, and the impact on confidentiality, integrity, and availability is high. Although no exploits are currently known in the wild, the severity and potential impact on critical industrial environments make this a significant threat. The lack of available patches at the time of publication necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
For European organizations, especially those in manufacturing, automotive, and industrial automation sectors, this vulnerability poses a significant risk. IndraWorks is commonly deployed in industrial control systems (ICS) and operational technology (OT) environments, where a successful RCE can lead to operational disruptions, safety hazards, intellectual property theft, and potential physical damage. The compromise of systems running IndraWorks could allow attackers to manipulate industrial processes, cause downtime, and breach sensitive data. Given the critical role of Bosch Rexroth products in European industry, the impact extends beyond IT to physical and economic domains. Additionally, the requirement for user interaction means that social engineering or phishing campaigns could be used to deliver the malicious files, increasing the attack surface. The high confidentiality, integrity, and availability impact could also affect compliance with European regulations such as NIS2 and GDPR if sensitive data or critical infrastructure is involved.
Mitigation Recommendations
1. Immediately educate users about the risks of opening unsolicited or unexpected files, especially those related to IndraWorks. 2. Implement strict file validation and sandboxing mechanisms to analyze files before they are opened by IndraWorks. 3. Employ endpoint protection solutions capable of detecting and blocking malicious serialized objects or unusual application behaviors. 4. Segment industrial networks to isolate systems running IndraWorks from general IT networks and limit exposure. 5. Monitor logs and network traffic for suspicious activity indicative of exploitation attempts. 6. Coordinate with Bosch Rexroth for timely patch deployment once available; in the meantime, consider disabling or restricting file import features if feasible. 7. Use application whitelisting to prevent unauthorized code execution. 8. Conduct regular security awareness training focusing on social engineering tactics that could deliver malicious files. 9. Maintain up-to-date backups of critical systems to enable recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- bosch
- Date Reserved
- 2025-09-25T12:06:05.896Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6995c8856aea4a407a9d0cfd
Added to database: 2/18/2026, 2:11:17 PM
Last enriched: 2/18/2026, 2:25:58 PM
Last updated: 2/21/2026, 12:20:58 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.