Bosch Rexroth IndraDrive
Plan Patch7.5ICS-CERT ICSA-24-312-03Nov 7, 2024
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
Bosch Rexroth IndraDrive FWA-INDRV-MP firmware versions prior to 20V36 contain a vulnerability (CWE-400) that allows an attacker to send arbitrary UDP messages to cause a denial-of-service condition, rendering the device unresponsive. This affects motor drive controllers used across industrial applications.
What this means
What could happen
An attacker on the network can send UDP packets to cause the IndraDrive controller to become unresponsive, interrupting motor drive operations and any dependent industrial processes.
Who's at risk
Organizations operating Bosch Rexroth IndraDrive motor controllers in manufacturing, water/wastewater treatment, power generation, and pulp-and-paper facilities should assess this vulnerability. Affected firmware versions prior to 20V36 are at risk.
How it could be exploited
An attacker with network access to the IndraDrive device sends specially crafted UDP messages to trigger a denial-of-service condition. No authentication or special configuration is required.
Prerequisites
- Network access to the IndraDrive device over UDP
- No credentials or authentication required
remotely exploitableno authentication requiredlow complexitydenial of service impactaffects motor drive control systems
Exploitability
Low exploit probability (EPSS 0.3%)
Affected products (1)
ProductAffected VersionsFix Status
Bosch Rexroth AG IndraDrive FWA-INDRV-MP: 17VRS<20V3617VRS<20V3620V36 or later
Remediation & Mitigation
0/4
Do now
0/2WORKAROUNDPlace IndraDrive devices behind a firewall and restrict UDP access to trusted engineering workstations only
WORKAROUNDIf device update is not feasible, implement compensatory measures per Bosch Security Manual Electric Drives and Controls
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate Bosch Rexroth IndraDrive FWA-INDRV-MP to firmware version 20V36 or later
Long-term hardening
0/1HARDENINGImplement network segmentation to isolate IndraDrive controllers from untrusted networks and the internet
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/d5c2444a-69ec-495f-90e1-8f166f0cad14