A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running the OPC.Testclient.
References
| Link | Resource |
|---|---|
| https://psirt.bosch.com/security-advisories/BOSCH-SA-591522.html | Vendor Advisory |
Configurations
History
24 Feb 2026, 16:01
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:bosch:rexroth_indraworks:*:*:*:*:*:*:*:* | |
| References | () https://psirt.bosch.com/security-advisories/BOSCH-SA-591522.html - Vendor Advisory | |
| First Time |
Bosch rexroth Indraworks
Bosch |
18 Feb 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 14:16
Updated : 2026-02-24 16:01
NVD link : CVE-2025-60035
Mitre link : CVE-2025-60035
CVE.ORG link : CVE-2025-60035
JSON object : View
Products Affected
bosch
- rexroth_indraworks
CWE
CWE-502
Deserialization of Untrusted Data
