CVE-2025-11565: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Schneider Electric PowerChute Serial Shutdown
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause elevated system access when a Web Admin user on the local network tampers with the POST/REST/UpdateJRE request payload.
AI Analysis
Technical Summary
CVE-2025-11565 is a path traversal vulnerability (CWE-22) identified in Schneider Electric's PowerChute Serial Shutdown software, specifically affecting versions 1.3 and earlier. The vulnerability arises from improper limitation of pathname inputs in the handling of the POST/REST/UpdateJRE request payload by the web administration interface. A Web Admin user on the local network can exploit this flaw by tampering with the request payload to traverse directories outside the intended restricted directory, thereby gaining elevated system access. This elevated access could allow the attacker to execute unauthorized commands, modify system files, or disrupt normal operations. The vulnerability requires local network access and a user with Web Admin privileges, which limits remote exploitation but still poses a significant risk within internal networks. The CVSS 4.0 score of 7.3 reflects a high severity due to the potential impact on confidentiality, integrity, and availability, combined with the requirement for privileges and local access. No public exploits are known at this time, but the vulnerability is officially published and should be addressed promptly. The lack of available patches at the time of disclosure suggests organizations must implement interim mitigations until updates are released. Given the critical role of PowerChute Serial Shutdown in managing power and UPS systems, exploitation could lead to operational disruptions in data centers and industrial environments.
Potential Impact
For European organizations, the impact of CVE-2025-11565 can be significant, especially those relying on Schneider Electric's PowerChute Serial Shutdown for managing uninterruptible power supplies (UPS) and power infrastructure. Successful exploitation could lead to unauthorized elevated access, enabling attackers to alter system configurations, disrupt power management processes, or cause denial of service conditions. This could affect data center uptime, industrial control systems, and critical infrastructure operations, potentially leading to financial losses, operational downtime, and safety risks. Confidentiality could be compromised if attackers access sensitive system files or logs. Integrity is at risk due to possible unauthorized modifications, and availability could be impacted by service disruptions. The requirement for local network access and Web Admin privileges somewhat limits the threat to internal or segmented networks, but insider threats or lateral movement by attackers within networks remain concerns. European organizations with stringent regulatory requirements for operational resilience and cybersecurity must prioritize addressing this vulnerability to avoid compliance issues and reputational damage.
Mitigation Recommendations
1. Upgrade Schneider Electric PowerChute Serial Shutdown to the latest patched version once available to eliminate the vulnerability. 2. Restrict access to the web administration interface strictly to trusted administrators and secure it behind network segmentation or VPNs to prevent unauthorized local network access. 3. Implement strict network access controls and monitoring to detect and block anomalous POST/REST/UpdateJRE requests that could indicate exploitation attempts. 4. Enforce strong authentication and role-based access controls for Web Admin users to minimize the risk of compromised credentials. 5. Conduct regular audits of system logs and network traffic for signs of suspicious activity related to path traversal or unauthorized access attempts. 6. Consider deploying web application firewalls (WAF) or intrusion detection/prevention systems (IDS/IPS) with custom rules to detect and block path traversal payloads targeting the affected endpoints. 7. Educate internal IT and security teams about the vulnerability and the importance of limiting local network access to critical management interfaces. 8. Develop and test incident response plans specifically addressing potential exploitation scenarios involving power management systems.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Belgium, Spain, Sweden
CVE-2025-11565: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Schneider Electric PowerChute Serial Shutdown
Description
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause elevated system access when a Web Admin user on the local network tampers with the POST/REST/UpdateJRE request payload.
AI-Powered Analysis
Technical Analysis
CVE-2025-11565 is a path traversal vulnerability (CWE-22) identified in Schneider Electric's PowerChute Serial Shutdown software, specifically affecting versions 1.3 and earlier. The vulnerability arises from improper limitation of pathname inputs in the handling of the POST/REST/UpdateJRE request payload by the web administration interface. A Web Admin user on the local network can exploit this flaw by tampering with the request payload to traverse directories outside the intended restricted directory, thereby gaining elevated system access. This elevated access could allow the attacker to execute unauthorized commands, modify system files, or disrupt normal operations. The vulnerability requires local network access and a user with Web Admin privileges, which limits remote exploitation but still poses a significant risk within internal networks. The CVSS 4.0 score of 7.3 reflects a high severity due to the potential impact on confidentiality, integrity, and availability, combined with the requirement for privileges and local access. No public exploits are known at this time, but the vulnerability is officially published and should be addressed promptly. The lack of available patches at the time of disclosure suggests organizations must implement interim mitigations until updates are released. Given the critical role of PowerChute Serial Shutdown in managing power and UPS systems, exploitation could lead to operational disruptions in data centers and industrial environments.
Potential Impact
For European organizations, the impact of CVE-2025-11565 can be significant, especially those relying on Schneider Electric's PowerChute Serial Shutdown for managing uninterruptible power supplies (UPS) and power infrastructure. Successful exploitation could lead to unauthorized elevated access, enabling attackers to alter system configurations, disrupt power management processes, or cause denial of service conditions. This could affect data center uptime, industrial control systems, and critical infrastructure operations, potentially leading to financial losses, operational downtime, and safety risks. Confidentiality could be compromised if attackers access sensitive system files or logs. Integrity is at risk due to possible unauthorized modifications, and availability could be impacted by service disruptions. The requirement for local network access and Web Admin privileges somewhat limits the threat to internal or segmented networks, but insider threats or lateral movement by attackers within networks remain concerns. European organizations with stringent regulatory requirements for operational resilience and cybersecurity must prioritize addressing this vulnerability to avoid compliance issues and reputational damage.
Mitigation Recommendations
1. Upgrade Schneider Electric PowerChute Serial Shutdown to the latest patched version once available to eliminate the vulnerability. 2. Restrict access to the web administration interface strictly to trusted administrators and secure it behind network segmentation or VPNs to prevent unauthorized local network access. 3. Implement strict network access controls and monitoring to detect and block anomalous POST/REST/UpdateJRE requests that could indicate exploitation attempts. 4. Enforce strong authentication and role-based access controls for Web Admin users to minimize the risk of compromised credentials. 5. Conduct regular audits of system logs and network traffic for signs of suspicious activity related to path traversal or unauthorized access attempts. 6. Consider deploying web application firewalls (WAF) or intrusion detection/prevention systems (IDS/IPS) with custom rules to detect and block path traversal payloads targeting the affected endpoints. 7. Educate internal IT and security teams about the vulnerability and the importance of limiting local network access to critical management interfaces. 8. Develop and test incident response plans specifically addressing potential exploitation scenarios involving power management systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- schneider
- Date Reserved
- 2025-10-09T15:10:36.405Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69148b1edc194680d69bd95b
Added to database: 11/12/2025, 1:26:54 PM
Last enriched: 11/12/2025, 1:41:46 PM
Last updated: 11/12/2025, 3:36:48 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9316: CWE-1284 Improper Validation of Specified Quantity in Input in N-able N-central
MediumCVE-2025-12152
UnknownCVE-2025-63666: n/a
UnknownCVE-2025-63667: n/a
UnknownCVE-2025-11567: CWE-276 Incorrect Default Permissions in Schneider Electric PowerChute Serial Shutdown
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.