Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13905: CWE-276 Incorrect Default Permissions in Schneider Electric EcoStruxure™ Process Expert

0
High
VulnerabilityCVE-2025-13905cvecve-2025-13905cwe-276
Published: Thu Jan 29 2026 (01/29/2026, 15:20:45 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EcoStruxure™ Process Expert

Description

CWE-276: Incorrect Default Permissions vulnerability exists that could cause privilege escalation through the reverse shell when one or more executable service binaries are modified in the installation folder by a local user with normal privilege upon service restart.

AI-Powered Analysis

AILast updated: 01/29/2026, 15:57:08 UTC

Technical Analysis

CVE-2025-13905 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) found in Schneider Electric's EcoStruxure™ Process Expert product, affecting all versions prior to 2025. The core issue arises from improperly set default permissions on executable service binaries located in the installation folder. These permissions allow local users with standard privileges to modify one or more of these binaries. When the affected service is restarted, the modified binaries can execute a reverse shell, enabling privilege escalation to higher system privileges. This attack vector requires the attacker to have local access and the ability to interact with the system to restart the service, but it does not require authentication bypass or network access. The vulnerability has a CVSS 4.0 base score of 7.0, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:L), and user interaction required (UI:P). The impact on confidentiality, integrity, and availability is high, as an attacker could gain elevated privileges and potentially control the system. No patches or exploits are currently publicly available, but the vulnerability poses a significant risk to industrial environments relying on EcoStruxure™ Process Expert for process automation and control. The vulnerability's exploitation could disrupt industrial operations, cause data breaches, or enable further lateral movement within critical infrastructure networks.

Potential Impact

For European organizations, particularly those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant risk. EcoStruxure™ Process Expert is widely used in process control environments, and successful exploitation could lead to unauthorized privilege escalation, allowing attackers to manipulate industrial processes, disrupt operations, or exfiltrate sensitive operational data. The impact extends to operational technology (OT) environments where availability and integrity are paramount. Disruptions could cause production downtime, safety hazards, and financial losses. Given the local access requirement, insider threats or attackers who gain initial footholds via other means could leverage this vulnerability to escalate privileges and deepen their control. The high confidentiality impact also raises concerns about intellectual property theft or espionage. European organizations with stringent regulatory requirements around industrial cybersecurity (e.g., NIS Directive) may face compliance risks if this vulnerability is not addressed promptly.

Mitigation Recommendations

1. Immediately audit and correct file and folder permissions within the EcoStruxure™ Process Expert installation directory to ensure that only authorized administrative accounts have write access to executable service binaries. 2. Implement strict access controls and user account management policies to limit local user privileges, preventing standard users from modifying service binaries. 3. Enforce service restart procedures that require administrative approval or are automated under controlled conditions to prevent unauthorized restarts. 4. Monitor file integrity of critical binaries using host-based intrusion detection systems (HIDS) or file integrity monitoring (FIM) tools to detect unauthorized modifications. 5. Segment OT networks to restrict local access to systems running EcoStruxure™ Process Expert, reducing the attack surface. 6. Develop and test incident response plans specific to industrial control system compromises, including privilege escalation scenarios. 7. Engage with Schneider Electric for official patches or updates once available and plan timely deployment. 8. Educate local users and administrators about the risks of privilege escalation and the importance of maintaining strict permission hygiene.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
schneider
Date Reserved
2025-12-02T16:35:40.124Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697b7ff8ac06320222994737

Added to database: 1/29/2026, 3:42:48 PM

Last enriched: 1/29/2026, 3:57:08 PM

Last updated: 1/29/2026, 5:57:20 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats