CVE-2025-24348
📋 TL;DR
A vulnerability in ctrlX OS allows authenticated low-privileged attackers to manipulate wireless network configuration files via crafted HTTP requests. This could enable network disruption or facilitate further attacks. Affected systems are those running vulnerable versions of ctrlX OS with the web application accessible.
💻 Affected Systems
- Bosch Rexroth ctrlX OS
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attacker could reconfigure wireless networks to intercept traffic, create backdoors, or disrupt industrial operations by disabling connectivity.
Likely Case
Network configuration changes causing connectivity issues or enabling man-in-the-middle attacks on wireless communications.
If Mitigated
Limited impact with proper network segmentation and access controls preventing low-privileged users from reaching the vulnerable interface.
🎯 Exploit Status
Exploitation requires authenticated access but involves simple HTTP request manipulation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: ctrlX OS 2.0.0
Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html
Restart Required: Yes
Instructions:
1. Download ctrlX OS 2.0.0 from official Bosch Rexroth sources. 2. Backup current configuration. 3. Apply update following vendor documentation. 4. Restart system. 5. Verify wireless network functionality.
🔧 Temporary Workarounds
Restrict Web Interface Access
allLimit access to ctrlX OS web interface to trusted networks and users only.
Configure firewall rules to restrict access to ctrlX OS web ports (typically 443/HTTPS)
Minimize User Privileges
allEnsure only necessary users have access to network configuration functions.
Review and restrict user roles in ctrlX OS administration panel
🧯 If You Can't Patch
- Implement strict network segmentation to isolate ctrlX OS from untrusted networks
- Monitor for unusual HTTP requests to network configuration endpoints and review authentication logs
🔍 How to Verify
Check if Vulnerable:
Check ctrlX OS version via web interface or SSH: cat /etc/os-release | grep VERSION
Check Version:
cat /etc/os-release | grep VERSION
Verify Fix Applied:
Confirm version is 2.0.0 or higher and test wireless configuration changes require appropriate privileges.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST/PUT requests to network configuration endpoints from low-privileged users
- Unauthorized wireless configuration changes in system logs
Network Indicators:
- Unusual HTTP traffic to /api/network/wireless endpoints
- Sudden wireless network configuration changes
SIEM Query:
source="ctrlx-os" AND (uri_path="/api/network/wireless" OR event_description="wireless config") AND user_role="low_privilege"