FKIE_CVE-2025-48862
Vulnerability from fkie_nvd - Published: 2025-08-14 09:15 - Updated: 2025-08-14 13:11
Severity ?
Summary
Ambiguous wording in the web interface of the ctrlX OS setup mechanism could lead the user to believe that the backup file is encrypted when a password is set. However, only the private key - if available in the backup - is encrypted, while the backup file itself remains unencrypted.
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ambiguous wording in the web interface of the ctrlX OS setup mechanism could lead the user to believe that the backup file is encrypted when a password is set. However, only the private key -\u00a0if available in the backup - is encrypted, while the backup file itself remains unencrypted."
},
{
"lang": "es",
"value": "La redacci\u00f3n ambigua en la interfaz web del mecanismo de configuraci\u00f3n de CtrlX OS podr\u00eda inducir al usuario a creer que el archivo de copia de seguridad est\u00e1 cifrado al establecer una contrase\u00f1a. Sin embargo, solo se cifra la clave privada (si est\u00e1 disponible en la copia de seguridad), mientras que el archivo de copia de seguridad permanece sin cifrar."
}
],
"id": "CVE-2025-48862",
"lastModified": "2025-08-14T13:11:53.633",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 4.0,
"source": "psirt@bosch.com",
"type": "Secondary"
}
]
},
"published": "2025-08-14T09:15:26.293",
"references": [
{
"source": "psirt@bosch.com",
"url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-129652.html"
}
],
"sourceIdentifier": "psirt@bosch.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-311"
},
{
"lang": "en",
"value": "CWE-1104"
}
],
"source": "psirt@bosch.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…