A vulnerability has been identified in the UA.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running the UA.Testclient.

Project Subscriptions

Vendors Products
Bosch Rexroth Subscribe
Indraworks Subscribe
Ua.testclient Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Bosch Rexroth
Bosch Rexroth indraworks
Bosch Rexroth ua.testclient
Vendors & Products Bosch Rexroth
Bosch Rexroth indraworks
Bosch Rexroth ua.testclient

Wed, 18 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in the UA.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running the UA.Testclient.
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: bosch

Published:

Updated: 2026-02-18T14:41:24.773Z

Reserved: 2025-09-25T12:06:05.896Z

Link: CVE-2025-60036

cve-icon Vulnrichment

Updated: 2026-02-18T14:41:21.488Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-18T14:16:04.663

Modified: 2026-02-18T17:51:53.510

Link: CVE-2025-60036

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-19T10:19:51Z

Weaknesses