Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11566: CWE-307 Improper Restriction of Excessive Authentication Attempts in Schneider Electric PowerChute Serial Shutdown

0
Medium
VulnerabilityCVE-2025-11566cvecve-2025-11566cwe-307
Published: Wed Nov 12 2025 (11/12/2025, 13:26:14 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: PowerChute Serial Shutdown

Description

CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that would allow an attacker on the local network to gain access to the user account by performing an arbitrary number of authentication attempts with different credentials on the /REST/shutdownnow endpoint.

AI-Powered Analysis

AILast updated: 11/12/2025, 13:55:36 UTC

Technical Analysis

CVE-2025-11566 identifies a vulnerability in Schneider Electric's PowerChute Serial Shutdown software, specifically versions 1.3 and earlier. The vulnerability is categorized under CWE-307, which pertains to improper restriction of excessive authentication attempts. The affected endpoint, /REST/shutdownnow, does not implement adequate controls to limit the number of authentication attempts an attacker can make. Consequently, an attacker positioned on the local network can perform an unlimited number of login attempts using different credentials without triggering account lockout or other throttling mechanisms. This lack of restriction enables brute force attacks to gain unauthorized access to user accounts. The vulnerability does not require prior authentication, user interaction, or physical access beyond local network presence, increasing its exploitability. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, and low to limited impacts on confidentiality, integrity, and availability. Although no public exploits are known, the vulnerability could allow attackers to disrupt power management operations or gain control over shutdown procedures, potentially affecting critical infrastructure. The vulnerability was reserved in October 2025 and published in November 2025, with no patches currently listed, emphasizing the need for proactive mitigation.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Schneider Electric's PowerChute Serial Shutdown to manage uninterruptible power supplies (UPS) and critical power infrastructure. Unauthorized access through brute force could lead to malicious or accidental shutdowns of critical systems, causing operational disruptions, data loss, or safety hazards. Sectors such as energy, manufacturing, healthcare, and data centers are particularly vulnerable due to their dependence on continuous power management. The ability to perform unlimited authentication attempts without lockout increases the likelihood of successful credential compromise. This could also facilitate lateral movement within networks, escalating the impact beyond the initial device. Given the critical nature of power management systems, exploitation could have cascading effects on availability and integrity of services. The medium CVSS score reflects moderate impact but the operational importance of the affected systems could amplify real-world consequences. European organizations must consider the risk to both IT and OT environments where PowerChute is deployed.

Mitigation Recommendations

1. Immediately implement network segmentation to isolate PowerChute Serial Shutdown devices from general user networks, limiting local network access to trusted administrators only. 2. Monitor authentication logs for unusual or repeated failed login attempts on the /REST/shutdownnow endpoint to detect brute force activity early. 3. Enforce strong credential policies and consider multi-factor authentication (MFA) where possible to reduce the risk of credential compromise. 4. Apply any available patches or updates from Schneider Electric as soon as they are released; maintain close communication with the vendor for updates. 5. If patches are not yet available, consider deploying compensating controls such as web application firewalls (WAFs) or intrusion prevention systems (IPS) to detect and block excessive authentication attempts. 6. Conduct regular security assessments and penetration tests focusing on local network access controls and authentication mechanisms for critical infrastructure devices. 7. Educate network administrators and security teams about this vulnerability and ensure incident response plans include scenarios involving power management system compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
schneider
Date Reserved
2025-10-09T15:11:52.000Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691491c4e0dfecc865795593

Added to database: 11/12/2025, 1:55:16 PM

Last enriched: 11/12/2025, 1:55:36 PM

Last updated: 11/12/2025, 3:36:49 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats