CVE-2025-11566: CWE-307 Improper Restriction of Excessive Authentication Attempts in Schneider Electric PowerChute™ Serial Shutdown
CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that would allow an attacker on the local network to gain access to the user account by performing an arbitrary number of authentication attempts with different credentials on the /REST/shutdownnow endpoint.
AI Analysis
Technical Summary
CVE-2025-11566 is a vulnerability classified under CWE-307, indicating improper restriction of excessive authentication attempts. It affects Schneider Electric's PowerChute™ Serial Shutdown software, specifically versions 1.3 and earlier. The vulnerability resides in the /REST/shutdownnow endpoint, which is designed to allow authorized users to initiate a shutdown sequence. Due to the lack of rate limiting or lockout mechanisms, an attacker positioned on the same local network can perform an unlimited number of authentication attempts with different credentials. This brute-force capability enables the attacker to eventually gain unauthorized access to a user account without any authentication or user interaction prerequisites. The vulnerability is remotely exploitable over the network without privileges or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no privileges or user interaction required, and low to limited impacts on confidentiality, integrity, and availability. Although no public exploits are known, the vulnerability could be leveraged to execute unauthorized shutdown commands, potentially disrupting critical systems reliant on PowerChute™ for orderly power management. The absence of patch links suggests that remediation may be pending or requires vendor engagement. The vulnerability's presence in industrial control environments or data centers elevates its significance due to the criticality of uninterrupted power management.
Potential Impact
For European organizations, especially those operating critical infrastructure, data centers, or industrial environments, this vulnerability poses a risk of unauthorized shutdowns leading to operational disruption, potential data loss, and safety hazards. PowerChute™ Serial Shutdown is commonly deployed to manage UPS systems and ensure graceful shutdowns during power events. Exploitation could allow attackers to forcibly shut down systems, causing downtime and impacting business continuity. Confidentiality and integrity impacts are limited but non-negligible since unauthorized access to user accounts could facilitate further malicious actions. The medium CVSS score reflects a moderate threat level; however, the ease of exploitation without authentication or user interaction increases urgency. Organizations in sectors such as energy, manufacturing, healthcare, and finance in Europe could face increased exposure. Additionally, disruption in critical infrastructure could have cascading effects on national security and public safety. The local network attack vector implies that internal network security posture is critical to mitigating risk.
Mitigation Recommendations
1. Apply vendor patches or updates as soon as they become available to address this vulnerability. 2. Implement strict network segmentation to isolate PowerChute™ Serial Shutdown systems from general user networks, limiting local network access to trusted administrators only. 3. Deploy network-level intrusion detection and prevention systems (IDS/IPS) to monitor and block brute-force authentication attempts targeting the /REST/shutdownnow endpoint. 4. Enforce strong authentication policies and consider multi-factor authentication (MFA) for access to PowerChute management interfaces where possible. 5. Regularly audit logs for repeated failed authentication attempts and unusual access patterns. 6. Restrict access to the REST API endpoints to known IP addresses or via VPN tunnels to reduce exposure. 7. Educate network administrators about this vulnerability and encourage prompt incident reporting. 8. If patching is delayed, consider temporary compensating controls such as disabling the vulnerable endpoint if feasible or deploying web application firewalls (WAF) with rate limiting rules.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Spain, Belgium, Sweden
CVE-2025-11566: CWE-307 Improper Restriction of Excessive Authentication Attempts in Schneider Electric PowerChute™ Serial Shutdown
Description
CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that would allow an attacker on the local network to gain access to the user account by performing an arbitrary number of authentication attempts with different credentials on the /REST/shutdownnow endpoint.
AI-Powered Analysis
Technical Analysis
CVE-2025-11566 is a vulnerability classified under CWE-307, indicating improper restriction of excessive authentication attempts. It affects Schneider Electric's PowerChute™ Serial Shutdown software, specifically versions 1.3 and earlier. The vulnerability resides in the /REST/shutdownnow endpoint, which is designed to allow authorized users to initiate a shutdown sequence. Due to the lack of rate limiting or lockout mechanisms, an attacker positioned on the same local network can perform an unlimited number of authentication attempts with different credentials. This brute-force capability enables the attacker to eventually gain unauthorized access to a user account without any authentication or user interaction prerequisites. The vulnerability is remotely exploitable over the network without privileges or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no privileges or user interaction required, and low to limited impacts on confidentiality, integrity, and availability. Although no public exploits are known, the vulnerability could be leveraged to execute unauthorized shutdown commands, potentially disrupting critical systems reliant on PowerChute™ for orderly power management. The absence of patch links suggests that remediation may be pending or requires vendor engagement. The vulnerability's presence in industrial control environments or data centers elevates its significance due to the criticality of uninterrupted power management.
Potential Impact
For European organizations, especially those operating critical infrastructure, data centers, or industrial environments, this vulnerability poses a risk of unauthorized shutdowns leading to operational disruption, potential data loss, and safety hazards. PowerChute™ Serial Shutdown is commonly deployed to manage UPS systems and ensure graceful shutdowns during power events. Exploitation could allow attackers to forcibly shut down systems, causing downtime and impacting business continuity. Confidentiality and integrity impacts are limited but non-negligible since unauthorized access to user accounts could facilitate further malicious actions. The medium CVSS score reflects a moderate threat level; however, the ease of exploitation without authentication or user interaction increases urgency. Organizations in sectors such as energy, manufacturing, healthcare, and finance in Europe could face increased exposure. Additionally, disruption in critical infrastructure could have cascading effects on national security and public safety. The local network attack vector implies that internal network security posture is critical to mitigating risk.
Mitigation Recommendations
1. Apply vendor patches or updates as soon as they become available to address this vulnerability. 2. Implement strict network segmentation to isolate PowerChute™ Serial Shutdown systems from general user networks, limiting local network access to trusted administrators only. 3. Deploy network-level intrusion detection and prevention systems (IDS/IPS) to monitor and block brute-force authentication attempts targeting the /REST/shutdownnow endpoint. 4. Enforce strong authentication policies and consider multi-factor authentication (MFA) for access to PowerChute management interfaces where possible. 5. Regularly audit logs for repeated failed authentication attempts and unusual access patterns. 6. Restrict access to the REST API endpoints to known IP addresses or via VPN tunnels to reduce exposure. 7. Educate network administrators about this vulnerability and encourage prompt incident reporting. 8. If patching is delayed, consider temporary compensating controls such as disabling the vulnerable endpoint if feasible or deploying web application firewalls (WAF) with rate limiting rules.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- schneider
- Date Reserved
- 2025-10-09T15:11:52.000Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691491c4e0dfecc865795593
Added to database: 11/12/2025, 1:55:16 PM
Last enriched: 11/19/2025, 2:31:15 PM
Last updated: 12/27/2025, 8:32:19 PM
Views: 89
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14177: CWE-125 Out-of-bounds Read in PHP Group PHP
MediumCVE-2025-14180: CWE-476 NULL Pointer Dereference in PHP Group PHP
HighCVE-2025-14178: CWE-787 Out-of-bounds Write in PHP Group PHP
MediumCVE-2025-15109: Unrestricted Upload in jackq XCMS
MediumCVE-2025-15108: Use of Hard-coded Cryptographic Key in PandaXGO PandaX
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.