Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-24680 | A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps. |
Sat, 16 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bosch
Bosch ctrlx Os |
|
| Vendors & Products |
Bosch
Bosch ctrlx Os |
Thu, 14 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 Aug 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps. | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2025-08-14T15:47:23.792Z
Reserved: 2025-05-27T10:45:32.638Z
Link: CVE-2025-48861
Updated: 2025-08-14T15:47:17.097Z
Status : Deferred
Published: 2025-08-14T09:15:26.107
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-48861
No data.
OpenCVE Enrichment
Updated: 2025-08-16T21:41:30Z
EUVD