Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bosch
Bosch rexroth Indraworks |
|
| CPEs | cpe:2.3:a:bosch:rexroth_indraworks:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Bosch
Bosch rexroth Indraworks |
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bosch Rexroth
Bosch Rexroth indraworks |
|
| Vendors & Products |
Bosch Rexroth
Bosch Rexroth indraworks |
Wed, 18 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running Rexroth IndraWorks. | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2026-02-18T14:34:07.420Z
Reserved: 2025-09-25T12:06:05.896Z
Link: CVE-2025-60037
Updated: 2026-02-18T14:34:04.010Z
Status : Analyzed
Published: 2026-02-18T14:16:04.813
Modified: 2026-02-24T16:02:00.273
Link: CVE-2025-60037
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:19:50Z