A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running Rexroth IndraWorks.
References
| Link | Resource |
|---|---|
| https://psirt.bosch.com/security-advisories/BOSCH-SA-591522.html | Vendor Advisory |
Configurations
History
24 Feb 2026, 16:01
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Bosch rexroth Indraworks
Bosch |
|
| CPE | cpe:2.3:a:bosch:rexroth_indraworks:*:*:*:*:*:*:*:* | |
| References | () https://psirt.bosch.com/security-advisories/BOSCH-SA-591522.html - Vendor Advisory |
18 Feb 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 14:16
Updated : 2026-02-24 16:01
NVD link : CVE-2025-60038
Mitre link : CVE-2025-60038
CVE.ORG link : CVE-2025-60038
JSON object : View
Products Affected
bosch
- rexroth_indraworks
CWE
CWE-502
Deserialization of Untrusted Data
