CVE-2025-48862

7.1 HIGH

📋 TL;DR

This vulnerability involves misleading interface wording in ctrlX OS backup functionality that suggests backup files are encrypted when a password is set, when in reality only private keys within the backup are encrypted. This affects users of Bosch Rexroth ctrlX OS who rely on the backup feature for system configuration protection.

💻 Affected Systems

Products:
  • Bosch Rexroth ctrlX OS
Versions: All versions prior to the fix
Operating Systems: ctrlX OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all systems using the web interface backup functionality with password protection enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with access to backup files could extract sensitive configuration data, credentials, and system information, potentially leading to full system compromise or lateral movement within the network.

🟠

Likely Case

Unauthorized personnel or malware with file system access could read backup files containing sensitive configuration data, exposing system settings and potentially credentials.

🟢

If Mitigated

With proper access controls and network segmentation, backup files remain inaccessible to unauthorized users, limiting exposure.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to backup files, which typically requires some level of system access or file sharing exposure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to vendor advisory for specific patched versions

Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-129652.html

Restart Required: Yes

Instructions:

1. Access the ctrlX OS web interface
2. Navigate to System Settings > Update
3. Apply the latest firmware update from Bosch Rexroth
4. Restart the system as prompted

🔧 Temporary Workarounds

Manual Backup Encryption

all

Manually encrypt backup files using external encryption tools after creation

Secure Backup Storage

all

Store backup files in encrypted storage locations with strict access controls

🧯 If You Can't Patch

  • Restrict access to backup file storage locations using file system permissions
  • Implement network segmentation to isolate systems containing backup files

🔍 How to Verify

Check if Vulnerable:

Check if backup files created with password protection are readable without the password using standard file viewers

Check Version:

Check system version in ctrlX OS web interface under System Information

Verify Fix Applied:

After update, verify backup files created with password protection cannot be read without proper decryption

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to backup file locations
  • Backup file creation events without proper encryption

Network Indicators:

  • Unexpected file transfers of backup files
  • Access to backup storage locations from unauthorized systems

SIEM Query:

source="ctrlx-os" AND (event="backup_created" OR file_access="*.backup")

🔗 References

📤 Share & Export