Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11565: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Schneider Electric PowerChute™ Serial Shutdown

0
High
VulnerabilityCVE-2025-11565cvecve-2025-11565cwe-22
Published: Wed Nov 12 2025 (11/12/2025, 13:19:55 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: PowerChute™ Serial Shutdown

Description

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause elevated system access when a Web Admin user on the local network tampers with the POST /REST/UpdateJRE request payload.

AI-Powered Analysis

AILast updated: 11/19/2025, 14:30:59 UTC

Technical Analysis

CVE-2025-11565 is a path traversal vulnerability classified under CWE-22 found in Schneider Electric's PowerChute™ Serial Shutdown software, specifically affecting versions 1.3 and earlier. The vulnerability arises due to improper validation and limitation of pathname inputs in the POST /REST/UpdateJRE API endpoint. A Web Admin user on the local network can tamper with the request payload to traverse directories outside the intended restricted path, potentially accessing or modifying sensitive files. This can lead to elevated system privileges, allowing attackers to execute unauthorized actions or escalate their access level. The CVSS 4.0 base score is 7.3 (high), reflecting the requirement for local network access (AV:L), high attack complexity (AC:H), and the need for low privileges (PR:L) but no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability with high scope and impact metrics. No patches or exploits are currently publicly available, but the risk remains significant due to the critical role of PowerChute in managing power shutdowns and system stability. The vulnerability's exploitation could disrupt power management processes, leading to potential downtime or damage to connected systems. The flaw is particularly concerning in industrial, data center, and critical infrastructure environments where PowerChute is deployed.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those in sectors relying heavily on Schneider Electric's power management solutions, such as manufacturing, energy, telecommunications, and data centers. Exploitation could lead to unauthorized access and control over power management systems, potentially causing improper shutdowns, data loss, or operational disruptions. This could affect business continuity and safety, particularly in critical infrastructure environments. Given the local network access requirement, internal threat actors or attackers who gain network foothold could leverage this vulnerability to escalate privileges and move laterally. The impact on confidentiality, integrity, and availability is high, with potential cascading effects on connected systems and services. European organizations must consider the regulatory implications of such a compromise, including GDPR concerns if personal or sensitive data is affected indirectly through system disruptions.

Mitigation Recommendations

1. Restrict network access to the PowerChute management interface strictly to trusted administrators and secure management VLANs to prevent unauthorized local network access. 2. Implement network segmentation and firewall rules to isolate PowerChute devices from general user networks. 3. Monitor and log POST /REST/UpdateJRE requests for unusual or malformed payloads indicative of path traversal attempts. 4. Employ application-layer filtering or Web Application Firewalls (WAFs) that can detect and block path traversal patterns in HTTP requests. 5. Coordinate with Schneider Electric for timely patch releases and apply updates as soon as they become available. 6. Conduct regular security assessments and penetration tests focusing on power management systems to identify and remediate similar vulnerabilities. 7. Educate administrators on the risks of local network access and enforce strong authentication and access controls for Web Admin users. 8. Maintain offline backups and incident response plans to quickly recover from potential exploitation impacts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
schneider
Date Reserved
2025-10-09T15:10:36.405Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69148b1edc194680d69bd95b

Added to database: 11/12/2025, 1:26:54 PM

Last enriched: 11/19/2025, 2:30:59 PM

Last updated: 12/27/2025, 8:32:01 PM

Views: 93

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats