TL;DR

Vulnerability in Bosch OPC.TestClient XML file parsing can lead to remote code execution, requiring user interaction. CVSS score of 7.8.

What happened

['Bosch Rexroth IndraWorks is vulnerable to a critical RCE flaw']

Why it matters for ops

['Remote attackers can execute arbitrary commands by exploiting untrusted XML files', 'User interaction required for exploitation']

Mitigation

  • Update to the latest version of IndraWorks
  • Disable unnecessary network services and ports
  • Implement strict XML parsing security measures

Action items

  • Review system configurations for affected components
  • Apply patches as soon as they become available

Detection IOCs

  • Unusual network traffic from IndraWorks installations to external IPs
  • Unexpected file creations or modifications in IndraWorks directories

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-109/