First published: Wed Apr 30 2025(Updated: )
A vulnerability in the web application of ctrlX OS allows a remote unauthenticated attacker to conduct various attacks against users of the vulnerable system, including web cache poisoning or Man-in-the-Middle (MitM), via a crafted HTTP request.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch ctrlX OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24339 is considered a high-severity vulnerability due to its potential for remote exploitation.
To fix CVE-2025-24339, update the Bosch ctrlX OS to the latest patched version provided by the vendor.
Any user of the Bosch ctrlX OS with accessible web applications is potentially affected by CVE-2025-24339.
CVE-2025-24339 can lead to web cache poisoning and Man-in-the-Middle (MitM) attacks.
Yes, CVE-2025-24339 can be exploited by remote unauthenticated attackers.