A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps.
History

Sat, 16 Aug 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Bosch
Bosch ctrlx Os
Vendors & Products Bosch
Bosch ctrlx Os

Thu, 14 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 Aug 2025 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps.
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: bosch

Published: 2025-08-14T09:07:24.465Z

Updated: 2025-08-14T15:47:23.792Z

Reserved: 2025-05-27T10:45:32.638Z

Link: CVE-2025-48861

cve-icon Vulnrichment

Updated: 2025-08-14T15:47:17.097Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-14T09:15:26.107

Modified: 2025-08-14T13:11:53.633

Link: CVE-2025-48861

cve-icon Redhat

No data.