Plattform
other
Komponente
ctrlx-os-device-admin
Behoben in
1.12.10
1.20.8
2.6.9
CVE-2025-24350 is a high-severity vulnerability affecting the “Certificates and Keys” functionality within the web application of ctrlX OS Device Admin. This flaw allows a remote, authenticated attacker with low privileges to write arbitrary certificates to any location on the file system using a specially crafted HTTP request. Versions 1.12.0 through 2.6.8 are vulnerable, and a fix is available in version 2.6.9.
Successful exploitation of CVE-2025-24350 could allow an attacker to compromise the trust infrastructure of a ctrlX OS device. By writing malicious certificates to the file system, an attacker could potentially impersonate legitimate entities, intercept communications, or gain unauthorized access to resources. The ability to write to arbitrary file system paths significantly expands the potential attack surface, allowing for broader impact beyond just certificate manipulation. This vulnerability could be leveraged to establish a persistent foothold within the system, enabling further reconnaissance and lateral movement.
CVE-2025-24350 was publicly disclosed on 2025-04-30. No public proof-of-concept (PoC) code has been released at the time of writing. The vulnerability's EPSS score is pending evaluation. It is not currently listed on the CISA KEV catalog.
Organizations utilizing ctrlX OS Device Admin in industrial control systems or other critical infrastructure environments are particularly at risk. Environments with weak authentication controls or shared user accounts are also more vulnerable. Any deployment relying on the integrity of certificates managed through the Device Admin web application should be considered at risk.
disclosure
Exploit-Status
EPSS
0.26% (49% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-24350 is to upgrade ctrlX OS to version 2.6.9 or later, which contains the fix. If an immediate upgrade is not feasible, consider implementing stricter file system permissions to limit write access to the certificate storage directory. Implement robust input validation on any certificate-related API endpoints to prevent malicious data from being written. Monitor system logs for unusual certificate creation or modification events.
Actualice ctrlX OS a una versión posterior a 1.12.9, 1.20.7 o 2.6.8, según corresponda, para mitigar la vulnerabilidad. Esto evitará que atacantes autenticados con pocos privilegios escriban certificados arbitrarios en el sistema de archivos. Consulte el aviso de seguridad de Bosch para obtener más detalles e instrucciones específicas.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-24350 is a high-severity vulnerability allowing a remote, authenticated attacker to write arbitrary certificates to any file system path within the ctrlX OS Device Admin web application, impacting versions 1.12.0–2.6.8.
You are affected if you are running ctrlX OS Device Admin versions 1.12.0 through 2.6.8. Assess your environment immediately to determine if you are vulnerable.
Upgrade to ctrlX OS Device Admin version 2.6.9 or later to remediate the vulnerability. Implement temporary workarounds if an immediate upgrade is not possible.
As of the current disclosure date, there are no confirmed reports of active exploitation, but the vulnerability’s ease of exploitation warrants immediate attention.
Refer to the official ctrlX OS security advisory for detailed information and guidance regarding CVE-2025-24350. Check the ctrlX OS website for updates.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.