CVE-2025-24338

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated low-privileged attackers to execute arbitrary client-side code in other users' browsers via crafted HTTP requests. It affects ctrlX OS web applications where the 'Manages app data' functionality is present. Attackers can perform actions as other users without their knowledge.

💻 Affected Systems

Products:
  • ctrlX OS
Versions: All versions prior to the fix
Operating Systems: ctrlX OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access with any privilege level. Web application component specifically.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, data theft, privilege escalation, and lateral movement within the application as any user.

🟠

Likely Case

Session hijacking, unauthorized data access, and manipulation of user-specific application data.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and strict session isolation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authentication but low privileges suffice. Multiple crafted HTTP requests needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Bosch security advisory for specific patched versions

Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html

Restart Required: Yes

Instructions:

1. Access Bosch PSIRT advisory
2. Download appropriate patch/update
3. Apply update following vendor instructions
4. Restart affected systems

🔧 Temporary Workarounds

Restrict network access

all

Limit access to ctrlX OS web interface to trusted networks only

Implement WAF rules

all

Configure web application firewall to detect and block suspicious HTTP request patterns

🧯 If You Can't Patch

  • Implement strict input validation and output encoding for all user-controlled data
  • Enforce same-origin policies and implement Content Security Policy headers

🔍 How to Verify

Check if Vulnerable:

Check ctrlX OS version against patched versions in Bosch advisory

Check Version:

Check ctrlX OS web interface or system information for version details

Verify Fix Applied:

Verify version is updated to patched release and test functionality

📡 Detection & Monitoring

Log Indicators:

  • Multiple HTTP requests to 'Manages app data' endpoints from same source
  • Unusual user agent or request patterns

Network Indicators:

  • HTTP traffic patterns showing crafted requests to vulnerable endpoints

SIEM Query:

source="web_logs" AND (uri CONTAINS "manages_app_data" OR similar) AND count > threshold

🔗 References

📤 Share & Export