CVE-2025-24343

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated low-privileged attackers to write arbitrary files to any location on the ctrlX OS filesystem via crafted HTTP requests. This affects all ctrlX OS web applications with the 'Manages app data' functionality enabled. Attackers could potentially overwrite critical system files or deploy malicious payloads.

💻 Affected Systems

Products:
  • Bosch Rexroth ctrlX OS
Versions: All versions prior to the patched version
Operating Systems: ctrlX OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the 'Manages app data' functionality to be enabled and accessible to authenticated users.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary file write leading to privilege escalation, persistence mechanisms, or complete system takeover by overwriting critical system binaries or configuration files.

🟠

Likely Case

Data manipulation, service disruption, or limited privilege escalation by overwriting application-specific files or configuration data.

🟢

If Mitigated

Limited impact with proper network segmentation, strict access controls, and monitoring that would detect unusual file write patterns.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but low privileges are sufficient. The vulnerability is in a specific HTTP endpoint handling file operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Bosch Security Advisory for specific patched versions

Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html

Restart Required: Yes

Instructions:

1. Review Bosch Security Advisory BOSCH-SA-640452. 2. Download and apply the latest ctrlX OS update from official Bosch sources. 3. Restart affected systems. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Disable 'Manages app data' functionality

all

Temporarily disable the vulnerable feature until patching can be completed

Restrict network access

all

Limit access to ctrlX OS web interface to trusted networks only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ctrlX OS systems from untrusted networks
  • Enforce principle of least privilege for all user accounts and monitor for unusual file write activities

🔍 How to Verify

Check if Vulnerable:

Check if your ctrlX OS version is listed as vulnerable in Bosch Security Advisory BOSCH-SA-640452

Check Version:

Check system information in ctrlX OS web interface or use vendor-specific CLI commands

Verify Fix Applied:

Verify the installed ctrlX OS version matches or exceeds the patched version specified in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations via HTTP requests
  • Multiple failed authentication attempts followed by successful file writes
  • HTTP requests to 'Manages app data' endpoints with unusual parameters

Network Indicators:

  • HTTP POST/PUT requests to file management endpoints with path traversal patterns
  • Unusual file upload patterns to ctrlX OS web interface

SIEM Query:

source="ctrlx_os" AND (http_method="POST" OR http_method="PUT") AND uri CONTAINS "appdata" AND (uri CONTAINS ".." OR uri CONTAINS "/etc/" OR uri CONTAINS "/bin/")

🔗 References

📤 Share & Export