A vulnerability in the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to induce a Denial-of-Service (DoS) condition on the device via multiple crafted HTTP requests. In the worst case, a full power cycle is needed to regain control of the device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 30 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 30 Apr 2025 11:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to induce a Denial-of-Service (DoS) condition on the device via multiple crafted HTTP requests. In the worst case, a full power cycle is needed to regain control of the device.
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: bosch

Published:

Updated: 2025-04-30T15:11:57.073Z

Reserved: 2025-01-20T15:09:10.532Z

Link: CVE-2025-24341

cve-icon Vulnrichment

Updated: 2025-04-30T15:10:03.656Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-30T12:15:15.493

Modified: 2025-05-02T13:53:40.163

Link: CVE-2025-24341

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.