A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 16 Aug 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Bosch
Bosch ctrlx Os
Vendors & Products Bosch
Bosch ctrlx Os

Thu, 14 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 Aug 2025 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps.
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: bosch

Published:

Updated: 2025-08-14T15:47:23.792Z

Reserved: 2025-05-27T10:45:32.638Z

Link: CVE-2025-48861

cve-icon Vulnrichment

Updated: 2025-08-14T15:47:17.097Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-14T09:15:26.107

Modified: 2025-08-14T13:11:53.633

Link: CVE-2025-48861

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-16T21:41:30Z