Skip to main content

CVE-2023-6409: CWE-798 Use of Hard-coded Credentials in Schneider Electric EcoStruxure Control Expert

High
VulnerabilityCVE-2023-6409cvecve-2023-6409cwe-798
Published: Wed Feb 14 2024 (02/14/2024, 16:47:05 UTC)
Source: CVE
Vendor/Project: Schneider Electric
Product: EcoStruxure Control Expert

Description

CWE-798: Use of Hard-coded Credentials vulnerability exists that could cause unauthorized access to a project file protected with application password when opening the file with EcoStruxure Control Expert.

AI-Powered Analysis

AILast updated: 07/04/2025, 22:27:57 UTC

Technical Analysis

CVE-2023-6409 is a high-severity vulnerability identified in Schneider Electric's EcoStruxure Control Expert software, specifically affecting versions prior to 16.0. The vulnerability is categorized under CWE-798, which pertains to the use of hard-coded credentials. In this case, the flaw allows unauthorized users to bypass the protection of project files that are secured with an application password. The root cause is the presence of hard-coded credentials within the software, which can be exploited to open protected project files without proper authorization. The CVSS v3.1 base score of 7.7 reflects a high impact on confidentiality and integrity, with no impact on availability. The attack vector is local (AV:L), meaning the attacker must have local access to the system, but no privileges or user interaction are required (PR:N, UI:N). The scope is unchanged (S:U), indicating the vulnerability affects only the vulnerable component. Although no known exploits are currently reported in the wild, the presence of hard-coded credentials is a critical security weakness that can lead to unauthorized access to sensitive control project files, potentially exposing industrial control system configurations and operational parameters. Given that EcoStruxure Control Expert is widely used in industrial automation and control environments, exploitation could compromise the integrity and confidentiality of critical infrastructure control logic and data.

Potential Impact

For European organizations, particularly those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant risk. Unauthorized access to project files could allow attackers to view or modify control logic, potentially leading to operational disruptions, safety hazards, or sabotage. Confidential information about industrial processes could be leaked, impacting intellectual property and competitive advantage. Since the vulnerability requires local access, the threat is heightened in environments where physical or network access controls are weak or where insider threats exist. The integrity of control systems is paramount in European critical infrastructure, and any compromise could have cascading effects on supply chains and public safety. Furthermore, regulatory frameworks such as the NIS Directive and GDPR impose strict requirements on protecting critical infrastructure and personal data, so exploitation could also lead to compliance violations and legal consequences.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading EcoStruxure Control Expert to version 16.0 or later, where the issue is presumably resolved. Until patching is possible, organizations should implement strict access controls to limit local access to systems running vulnerable versions. This includes enforcing strong physical security, network segmentation, and role-based access controls to minimize the risk of unauthorized local access. Additionally, auditing and monitoring access to control engineering workstations should be enhanced to detect any suspicious activity. Organizations should review and rotate any credentials associated with project files and avoid relying on application-level password protection alone. Implementing multi-factor authentication for accessing control engineering environments can add an extra layer of defense. Finally, Schneider Electric customers should stay informed through vendor advisories and apply any recommended security updates promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2023-11-30T09:53:56.413Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd70c5

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/4/2025, 10:27:57 PM

Last updated: 8/4/2025, 10:47:55 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats