CVE-2025-24348

5.4 MEDIUM

📋 TL;DR

A vulnerability in ctrlX OS allows authenticated low-privileged attackers to manipulate wireless network configuration files via crafted HTTP requests. This could enable network disruption or facilitate further attacks. Affected systems are those running vulnerable versions of ctrlX OS with the web application accessible.

💻 Affected Systems

Products:
  • Bosch Rexroth ctrlX OS
Versions: All versions before ctrlX OS 2.0.0
Operating Systems: ctrlX OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires web application access and authenticated low-privileged user account.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker could reconfigure wireless networks to intercept traffic, create backdoors, or disrupt industrial operations by disabling connectivity.

🟠

Likely Case

Network configuration changes causing connectivity issues or enabling man-in-the-middle attacks on wireless communications.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing low-privileged users from reaching the vulnerable interface.

🌐 Internet-Facing: HIGH if web interface is exposed to internet, as authenticated attackers can exploit remotely.
🏢 Internal Only: MEDIUM for internal networks, requiring authenticated access but posing risk to operational technology environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but involves simple HTTP request manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ctrlX OS 2.0.0

Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html

Restart Required: Yes

Instructions:

1. Download ctrlX OS 2.0.0 from official Bosch Rexroth sources. 2. Backup current configuration. 3. Apply update following vendor documentation. 4. Restart system. 5. Verify wireless network functionality.

🔧 Temporary Workarounds

Restrict Web Interface Access

all

Limit access to ctrlX OS web interface to trusted networks and users only.

Configure firewall rules to restrict access to ctrlX OS web ports (typically 443/HTTPS)

Minimize User Privileges

all

Ensure only necessary users have access to network configuration functions.

Review and restrict user roles in ctrlX OS administration panel

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ctrlX OS from untrusted networks
  • Monitor for unusual HTTP requests to network configuration endpoints and review authentication logs

🔍 How to Verify

Check if Vulnerable:

Check ctrlX OS version via web interface or SSH: cat /etc/os-release | grep VERSION

Check Version:

cat /etc/os-release | grep VERSION

Verify Fix Applied:

Confirm version is 2.0.0 or higher and test wireless configuration changes require appropriate privileges.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST/PUT requests to network configuration endpoints from low-privileged users
  • Unauthorized wireless configuration changes in system logs

Network Indicators:

  • Unusual HTTP traffic to /api/network/wireless endpoints
  • Sudden wireless network configuration changes

SIEM Query:

source="ctrlx-os" AND (uri_path="/api/network/wireless" OR event_description="wireless config") AND user_role="low_privilege"

🔗 References

📤 Share & Export