A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps.
Metrics
Affected Vendors & Products
References
History
Sat, 16 Aug 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bosch
Bosch ctrlx Os |
|
Vendors & Products |
Bosch
Bosch ctrlx Os |
Thu, 14 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 14 Aug 2025 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps. | |
Weaknesses | CWE-284 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: bosch
Published: 2025-08-14T09:07:24.465Z
Updated: 2025-08-14T15:47:23.792Z
Reserved: 2025-05-27T10:45:32.638Z
Link: CVE-2025-48861

Updated: 2025-08-14T15:47:17.097Z

Status : Awaiting Analysis
Published: 2025-08-14T09:15:26.107
Modified: 2025-08-14T13:11:53.633
Link: CVE-2025-48861

No data.