Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bosch
Bosch rexroth Indraworks |
|
| CPEs | cpe:2.3:a:bosch:rexroth_indraworks:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Bosch
Bosch rexroth Indraworks |
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bosch Rexroth
Bosch Rexroth indraworks |
|
| Vendors & Products |
Bosch Rexroth
Bosch Rexroth indraworks |
Wed, 18 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running Rexroth IndraWorks. | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2026-02-18T14:23:44.501Z
Reserved: 2025-09-25T12:06:05.896Z
Link: CVE-2025-60038
Updated: 2026-02-18T14:23:41.128Z
Status : Analyzed
Published: 2026-02-18T14:16:04.960
Modified: 2026-02-24T16:01:50.337
Link: CVE-2025-60038
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:19:49Z