Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11567: CWE-276 Incorrect Default Permissions in Schneider Electric PowerChute Serial Shutdown

0
High
VulnerabilityCVE-2025-11567cvecve-2025-11567cwe-276
Published: Wed Nov 12 2025 (11/12/2025, 13:27:56 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: PowerChute Serial Shutdown

Description

CWE-276: Incorrect Default Permissions vulnerability exists that could cause elevated system access when the target installation folder is not properly secured.

AI-Powered Analysis

AILast updated: 11/12/2025, 13:55:50 UTC

Technical Analysis

CVE-2025-11567 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting Schneider Electric's PowerChute Serial Shutdown software, specifically versions 1.3 and earlier. The root cause is improper default permissions set on the installation folder, which can allow users with limited privileges to escalate their access rights on the affected system. This vulnerability does not require user interaction but does require the attacker to have some level of local access (low attack vector). The CVSS 4.0 base score is 7.3, indicating a high severity due to the potential for significant impact on confidentiality, integrity, and availability of the system. The vulnerability could allow unauthorized modification or execution of files within the installation directory, potentially leading to privilege escalation and control over the system. No public exploits have been reported yet, but the presence of incorrect permissions is a common and easily exploitable weakness if local access is obtained. The vulnerability is particularly concerning in environments where PowerChute Serial Shutdown is used to manage power and shutdown sequences for critical infrastructure, increasing the risk of disruption or sabotage. The lack of a patch link suggests that remediation may currently rely on manual permission corrections or awaiting vendor updates.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in sectors relying on uninterrupted power management such as data centers, manufacturing, healthcare, and utilities. Exploitation could lead to unauthorized system control, potentially disrupting power shutdown sequences and causing operational downtime or damage to hardware. Confidentiality could be compromised if attackers gain access to sensitive system files or logs. Integrity is at risk due to possible unauthorized modification of software components or configuration files. Availability could be impacted if attackers manipulate shutdown processes or cause system instability. Given Schneider Electric's strong market presence in Europe, particularly in Germany, France, the UK, and the Netherlands, organizations in these countries are more vulnerable. The vulnerability's requirement for local access means insider threats or attackers with initial footholds could leverage it for privilege escalation, increasing the threat level in environments with multiple users or less restrictive local access policies.

Mitigation Recommendations

Organizations should immediately audit the permissions of the PowerChute Serial Shutdown installation folder and ensure that only authorized system administrators have write and modify permissions. Restrict local user privileges to the minimum necessary to operate their roles, preventing unprivileged users from accessing installation directories. Monitor and log access attempts to critical software folders to detect suspicious activity. Apply application whitelisting to prevent unauthorized execution of modified files. Until an official patch is released by Schneider Electric, consider isolating affected systems from untrusted users and networks to reduce risk. Regularly review and update endpoint security controls and implement strict access control policies. Engage with Schneider Electric support to obtain guidance on patch availability and recommended configuration hardening. Additionally, conduct user training to raise awareness about the risks of local privilege escalation and the importance of secure system configurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
schneider
Date Reserved
2025-10-09T15:17:30.858Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691491c4e0dfecc865795596

Added to database: 11/12/2025, 1:55:16 PM

Last enriched: 11/12/2025, 1:55:50 PM

Last updated: 11/12/2025, 3:17:01 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats