CVE-2025-60037

7.8 HIGH

📋 TL;DR

This vulnerability in Rexroth IndraWorks allows attackers to execute arbitrary code on a user's system by tricking them into opening a malicious file, leading to remote code execution (RCE). It affects users of Rexroth IndraWorks software, potentially compromising industrial control systems. Exploitation requires user interaction, such as opening a manipulated file.

💻 Affected Systems

Products:
  • Rexroth IndraWorks
Versions: Specific versions not detailed in provided reference; check vendor advisory for exact range.
Operating Systems: Windows-based systems running Rexroth IndraWorks
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where Rexroth IndraWorks is installed and users can open files; industrial control systems may be at higher risk due to operational criticality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise, enabling attackers to take control of the industrial control system, disrupt operations, steal sensitive data, or cause physical damage.

🟠

Likely Case

Local code execution on the affected system, allowing attackers to install malware, exfiltrate data, or pivot to other network resources.

🟢

If Mitigated

Limited impact if proper security controls like file restrictions, user training, and network segmentation are in place, reducing the chance of successful exploitation.

🌐 Internet-Facing: LOW, as exploitation requires user interaction with a malicious file, typically not directly accessible over the internet without social engineering.
🏢 Internal Only: MEDIUM, as internal users could inadvertently open malicious files via email or shared drives, posing a risk to operational technology environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM, as it requires crafting a malicious file and social engineering to trick a user into opening it.

Exploitation depends on user interaction; no public proof-of-concept known at this time, but the vulnerability is based on deserialization flaws (CWE-502), which are commonly exploited.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions.

Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-591522.html

Restart Required: Yes

Instructions:

1. Review the vendor advisory at the provided URL. 2. Identify affected versions of Rexroth IndraWorks. 3. Apply the official patch or update to a fixed version as recommended by Bosch Rexroth. 4. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict File Execution

windows

Limit user ability to open untrusted files by implementing application whitelisting or file extension restrictions.

Use Group Policy or security software to block execution of suspicious file types associated with Rexroth IndraWorks.

User Awareness Training

all

Educate users on the risks of opening unknown or unexpected files, especially in industrial environments.

Conduct training sessions and distribute guidelines on safe file handling practices.

🧯 If You Can't Patch

  • Implement network segmentation to isolate Rexroth IndraWorks systems from critical networks, reducing lateral movement risk.
  • Deploy endpoint detection and response (EDR) tools to monitor for suspicious file activities and block malicious processes.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Rexroth IndraWorks against the vendor advisory to see if it falls within the affected range.

Check Version:

Consult Rexroth IndraWorks documentation or system properties for version information; specific command may vary by installation.

Verify Fix Applied:

After applying the patch, verify the software version has been updated to a non-vulnerable release as specified in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access or execution events in Rexroth IndraWorks logs, unexpected process creations, or error messages related to deserialization.

Network Indicators:

  • Suspicious outbound connections from the system post-file opening, indicating potential command and control activity.

SIEM Query:

Example: 'source="Rexroth IndraWorks" AND (event_type="file_open" OR process_name="malicious.exe")' - adjust based on log sources and SIEM capabilities.

🔗 References

📤 Share & Export