CVE-2025-24341

6.5 MEDIUM

📋 TL;DR

A vulnerability in ctrlX OS web application allows authenticated low-privileged attackers to cause denial-of-service via crafted HTTP requests. This affects Bosch ctrlX OS devices running vulnerable versions, potentially requiring physical power cycling to restore functionality.

💻 Affected Systems

Products:
  • Bosch ctrlX OS
Versions: Versions prior to 2.0.0
Operating Systems: ctrlX OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access but low privileges are sufficient. Web application component specifically affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Device becomes completely unresponsive, requiring physical power cycle to regain control, causing extended downtime.

🟠

Likely Case

Temporary service disruption affecting web interface and potentially other services until system recovers or is restarted.

🟢

If Mitigated

Minimal impact with proper network segmentation, authentication controls, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but low privileges are sufficient. Multiple crafted HTTP requests needed to trigger DoS.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.0 or later

Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html

Restart Required: Yes

Instructions:

1. Backup device configuration. 2. Update ctrlX OS to version 2.0.0 or later via official update mechanism. 3. Restart device as required. 4. Verify update successful.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to ctrlX OS web interface to trusted IP addresses only

Authentication Hardening

all

Implement strong authentication policies and monitor for suspicious login attempts

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ctrlX devices from untrusted networks
  • Deploy rate limiting and web application firewall to detect and block malicious HTTP request patterns

🔍 How to Verify

Check if Vulnerable:

Check ctrlX OS version via web interface or CLI. If version is below 2.0.0, device is vulnerable.

Check Version:

Check via ctrlX web interface System Information or use device-specific CLI commands

Verify Fix Applied:

Verify ctrlX OS version is 2.0.0 or higher after update. Test web interface functionality.

📡 Detection & Monitoring

Log Indicators:

  • Multiple HTTP requests from single source in short timeframe
  • Web service errors or crashes
  • Authentication logs showing repeated low-privileged user access

Network Indicators:

  • Unusual HTTP request patterns to ctrlX web interface
  • Increased network traffic to device web ports

SIEM Query:

source="ctrlX" AND (http_request_count > threshold OR web_service_error)

🔗 References

📤 Share & Export