CVE-2025-11567: CWE-276 Incorrect Default Permissions in Schneider Electric PowerChute Serial Shutdown
CWE-276: Incorrect Default Permissions vulnerability exists that could cause elevated system access when the target installation folder is not properly secured.
AI Analysis
Technical Summary
CVE-2025-11567 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting Schneider Electric's PowerChute Serial Shutdown software, specifically versions 1.3 and earlier. The root cause is improper default permissions set on the installation folder, which can allow users with limited privileges to escalate their access rights on the affected system. This vulnerability does not require user interaction but does require the attacker to have some level of local access (low attack vector). The CVSS 4.0 base score is 7.3, indicating a high severity due to the potential for significant impact on confidentiality, integrity, and availability of the system. The vulnerability could allow unauthorized modification or execution of files within the installation directory, potentially leading to privilege escalation and control over the system. No public exploits have been reported yet, but the presence of incorrect permissions is a common and easily exploitable weakness if local access is obtained. The vulnerability is particularly concerning in environments where PowerChute Serial Shutdown is used to manage power and shutdown sequences for critical infrastructure, increasing the risk of disruption or sabotage. The lack of a patch link suggests that remediation may currently rely on manual permission corrections or awaiting vendor updates.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in sectors relying on uninterrupted power management such as data centers, manufacturing, healthcare, and utilities. Exploitation could lead to unauthorized system control, potentially disrupting power shutdown sequences and causing operational downtime or damage to hardware. Confidentiality could be compromised if attackers gain access to sensitive system files or logs. Integrity is at risk due to possible unauthorized modification of software components or configuration files. Availability could be impacted if attackers manipulate shutdown processes or cause system instability. Given Schneider Electric's strong market presence in Europe, particularly in Germany, France, the UK, and the Netherlands, organizations in these countries are more vulnerable. The vulnerability's requirement for local access means insider threats or attackers with initial footholds could leverage it for privilege escalation, increasing the threat level in environments with multiple users or less restrictive local access policies.
Mitigation Recommendations
Organizations should immediately audit the permissions of the PowerChute Serial Shutdown installation folder and ensure that only authorized system administrators have write and modify permissions. Restrict local user privileges to the minimum necessary to operate their roles, preventing unprivileged users from accessing installation directories. Monitor and log access attempts to critical software folders to detect suspicious activity. Apply application whitelisting to prevent unauthorized execution of modified files. Until an official patch is released by Schneider Electric, consider isolating affected systems from untrusted users and networks to reduce risk. Regularly review and update endpoint security controls and implement strict access control policies. Engage with Schneider Electric support to obtain guidance on patch availability and recommended configuration hardening. Additionally, conduct user training to raise awareness about the risks of local privilege escalation and the importance of secure system configurations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2025-11567: CWE-276 Incorrect Default Permissions in Schneider Electric PowerChute Serial Shutdown
Description
CWE-276: Incorrect Default Permissions vulnerability exists that could cause elevated system access when the target installation folder is not properly secured.
AI-Powered Analysis
Technical Analysis
CVE-2025-11567 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting Schneider Electric's PowerChute Serial Shutdown software, specifically versions 1.3 and earlier. The root cause is improper default permissions set on the installation folder, which can allow users with limited privileges to escalate their access rights on the affected system. This vulnerability does not require user interaction but does require the attacker to have some level of local access (low attack vector). The CVSS 4.0 base score is 7.3, indicating a high severity due to the potential for significant impact on confidentiality, integrity, and availability of the system. The vulnerability could allow unauthorized modification or execution of files within the installation directory, potentially leading to privilege escalation and control over the system. No public exploits have been reported yet, but the presence of incorrect permissions is a common and easily exploitable weakness if local access is obtained. The vulnerability is particularly concerning in environments where PowerChute Serial Shutdown is used to manage power and shutdown sequences for critical infrastructure, increasing the risk of disruption or sabotage. The lack of a patch link suggests that remediation may currently rely on manual permission corrections or awaiting vendor updates.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in sectors relying on uninterrupted power management such as data centers, manufacturing, healthcare, and utilities. Exploitation could lead to unauthorized system control, potentially disrupting power shutdown sequences and causing operational downtime or damage to hardware. Confidentiality could be compromised if attackers gain access to sensitive system files or logs. Integrity is at risk due to possible unauthorized modification of software components or configuration files. Availability could be impacted if attackers manipulate shutdown processes or cause system instability. Given Schneider Electric's strong market presence in Europe, particularly in Germany, France, the UK, and the Netherlands, organizations in these countries are more vulnerable. The vulnerability's requirement for local access means insider threats or attackers with initial footholds could leverage it for privilege escalation, increasing the threat level in environments with multiple users or less restrictive local access policies.
Mitigation Recommendations
Organizations should immediately audit the permissions of the PowerChute Serial Shutdown installation folder and ensure that only authorized system administrators have write and modify permissions. Restrict local user privileges to the minimum necessary to operate their roles, preventing unprivileged users from accessing installation directories. Monitor and log access attempts to critical software folders to detect suspicious activity. Apply application whitelisting to prevent unauthorized execution of modified files. Until an official patch is released by Schneider Electric, consider isolating affected systems from untrusted users and networks to reduce risk. Regularly review and update endpoint security controls and implement strict access control policies. Engage with Schneider Electric support to obtain guidance on patch availability and recommended configuration hardening. Additionally, conduct user training to raise awareness about the risks of local privilege escalation and the importance of secure system configurations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- schneider
- Date Reserved
- 2025-10-09T15:17:30.858Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691491c4e0dfecc865795596
Added to database: 11/12/2025, 1:55:16 PM
Last enriched: 11/12/2025, 1:55:50 PM
Last updated: 11/12/2025, 3:17:01 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63666: n/a
UnknownCVE-2025-63667: n/a
UnknownCVE-2025-11566: CWE-307 Improper Restriction of Excessive Authentication Attempts in Schneider Electric PowerChute Serial Shutdown
MediumCVE-2025-11565: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Schneider Electric PowerChute Serial Shutdown
HighCVE-2025-62876: CWE-250: Execution with Unnecessary Privileges in SUSE openSUSE
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.