CVE-2025-24349

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated low-privileged attackers to delete physical network interface configurations on ctrlX OS web applications via crafted HTTP requests. This affects systems running vulnerable versions of ctrlX OS with network interface functionality enabled. Attackers can disrupt network connectivity and potentially cause denial of service.

💻 Affected Systems

Products:
  • ctrlX OS
Versions: All versions prior to ctrlX OS 2.0.0
Operating Systems: ctrlX OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network interfaces functionality to be enabled and accessible via web application.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network disruption leading to denial of service, loss of remote management capabilities, and potential cascading failures in industrial control systems.

🟠

Likely Case

Temporary network outages requiring manual reconfiguration, disruption of operational technology communications, and potential production downtime.

🟢

If Mitigated

Minimal impact with proper network segmentation, monitoring, and access controls preventing unauthorized configuration changes.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but only low privileges needed. Crafted HTTP request to specific endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ctrlX OS 2.0.0

Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html

Restart Required: Yes

Instructions:

1. Download ctrlX OS 2.0.0 from official Bosch sources. 2. Backup current configuration. 3. Apply update through ctrlX OS management interface. 4. Restart system. 5. Verify network interfaces are functioning correctly.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict access to ctrlX OS web interface to trusted networks only

iptables -A INPUT -p tcp --dport 443 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

User Privilege Reduction

all

Review and minimize user accounts with web interface access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ctrlX OS systems from untrusted networks
  • Enable detailed logging and monitoring for network configuration changes and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check ctrlX OS version via web interface or CLI. Versions prior to 2.0.0 are vulnerable.

Check Version:

cat /etc/os-release | grep VERSION

Verify Fix Applied:

Verify system is running ctrlX OS 2.0.0 or later and test network interface configuration deletion attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST/PUT/DELETE requests to network interface configuration endpoints
  • Unauthorized configuration changes to network interfaces
  • Failed authentication attempts followed by configuration changes

Network Indicators:

  • Unusual HTTP traffic patterns to ctrlX OS web interface
  • Sudden network interface configuration changes

SIEM Query:

source="ctrlx_os" AND (http_method="DELETE" OR http_method="POST") AND uri="/api/network/interfaces/*"

🔗 References

📤 Share & Export