CVE-2025-24345

6.3 MEDIUM

📋 TL;DR

A vulnerability in the Hosts functionality of ctrlX OS web application allows authenticated low-privileged attackers to manipulate the system's hosts file via crafted HTTP requests. This affects ctrlX OS installations with web interface access. Attackers could redirect network traffic or disrupt name resolution.

💻 Affected Systems

Products:
  • Bosch Rexroth ctrlX OS
Versions: All versions before 2.0.0
Operating Systems: ctrlX OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires web application access with authenticated low-privileged user account.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers redirect critical system traffic to malicious servers, enabling credential theft, man-in-the-middle attacks, or service disruption across the network.

🟠

Likely Case

Local network disruption, DNS redirection for specific services, or denial of service through incorrect host resolution.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring; attackers can only affect local system resolution.

🌐 Internet-Facing: MEDIUM - Requires authentication but web interfaces may be exposed; successful exploitation could redirect traffic.
🏢 Internal Only: HIGH - Internal attackers with low privileges can manipulate critical system files affecting network operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but involves simple HTTP request manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.0

Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download ctrlX OS 2.0.0 from official Bosch Rexroth portal. 3. Apply update via ctrlX OS management interface. 4. Restart system. 5. Verify hosts file permissions are properly restricted.

🔧 Temporary Workarounds

Restrict Web Interface Access

all

Limit access to ctrlX OS web interface to trusted networks only

Configure firewall rules to restrict access to ctrlX web ports (typically 443)

Implement Least Privilege

all

Review and restrict user accounts to minimum necessary privileges

Review user roles in ctrlX OS administration interface
Remove unnecessary low-privileged accounts

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ctrlX OS systems from critical networks
  • Deploy host-based monitoring to detect unauthorized modifications to /etc/hosts file

🔍 How to Verify

Check if Vulnerable:

Check ctrlX OS version via web interface or CLI: if version is below 2.0.0, system is vulnerable.

Check Version:

ssh admin@ctrlx-ip 'cat /etc/ctrlx-version' or check via web interface System Information

Verify Fix Applied:

Verify version is 2.0.0 or higher and test that low-privileged users cannot modify hosts file via web interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST/PUT requests to hosts-related endpoints
  • Multiple failed authentication attempts followed by successful low-privileged login

Network Indicators:

  • Unexpected DNS resolution changes from ctrlX systems
  • Traffic redirection to unusual IP addresses

SIEM Query:

source="ctrlx-os" AND (uri_path="/api/hosts" OR uri_path CONTAINS "hosts") AND http_method IN ("POST", "PUT", "DELETE")

🔗 References

📤 Share & Export