CVE-2025-13957: CWE-798: Use of Hard-coded Credentials in Schneider Electric EcoStruxure™ IT Data Center Expert
CVE-2025-13957 is a high-severity vulnerability in Schneider Electric's EcoStruxure IT Data Center Expert (version 9. 0 and prior) involving the use of hard-coded credentials (CWE-798). This flaw can lead to information disclosure and remote code execution when the SOCKS Proxy feature is enabled, which is disabled by default. Exploitation requires knowledge of administrator and PostgreSQL database credentials and high privileges. The vulnerability does not require user interaction but does require some level of authentication. No known exploits are currently reported in the wild. Organizations using affected versions should prioritize patching or mitigating this issue to prevent potential compromise of critical data center management systems.
AI Analysis
Technical Summary
CVE-2025-13957 is a vulnerability classified under CWE-798, indicating the use of hard-coded credentials within Schneider Electric's EcoStruxure IT Data Center Expert software, versions 9.0 and earlier. The vulnerability arises specifically when the SOCKS Proxy feature is enabled, which is disabled by default, limiting exposure. The presence of hard-coded credentials for both administrator access and the PostgreSQL database creates a critical security weakness. An attacker with knowledge of these credentials and high privileges could exploit this flaw to disclose sensitive information and execute arbitrary code remotely on the affected system. The CVSS 4.0 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, and the requirement for privileged authentication. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could gain control over the data center management platform, potentially disrupting operations or exfiltrating sensitive data. No patches are currently linked, and no active exploits have been reported, but the risk remains significant due to the critical nature of the affected product in managing IT infrastructure.
Potential Impact
The vulnerability poses a significant risk to organizations relying on Schneider Electric's EcoStruxure IT Data Center Expert for managing critical data center operations. Exploitation could lead to unauthorized access to sensitive infrastructure management data, manipulation or disruption of data center operations, and potential lateral movement within the network. This could result in operational downtime, data breaches, and loss of control over critical IT assets. Given the product's role in data center management, the impact extends to availability and integrity of IT services, potentially affecting business continuity. Organizations in sectors with high dependence on data center uptime, such as finance, healthcare, telecommunications, and manufacturing, face elevated risks. The requirement for privileged credentials limits exploitation to insiders or attackers who have already compromised credentials, but the presence of hard-coded credentials increases the attack surface and risk of credential leakage.
Mitigation Recommendations
Organizations should immediately verify whether the SOCKS Proxy feature is enabled in their EcoStruxure IT Data Center Expert deployments and disable it if not required, as it is disabled by default and its activation increases exposure. They should audit and rotate any hard-coded or default credentials if possible, and enforce strict credential management policies. Network segmentation should be applied to restrict access to the management interface and PostgreSQL database to trusted administrators only. Monitoring and logging should be enhanced to detect unusual access patterns or attempts to use hard-coded credentials. Since no patches are currently available, organizations should engage with Schneider Electric for updates or workarounds. Additionally, implementing multi-factor authentication (MFA) for administrative access can reduce risk. Regular security assessments and penetration testing focused on this product can help identify exploitation attempts early.
Affected Countries
United States, Germany, France, United Kingdom, China, Japan, South Korea, India, Canada, Australia, Brazil, Netherlands, Singapore
CVE-2025-13957: CWE-798: Use of Hard-coded Credentials in Schneider Electric EcoStruxure™ IT Data Center Expert
Description
CVE-2025-13957 is a high-severity vulnerability in Schneider Electric's EcoStruxure IT Data Center Expert (version 9. 0 and prior) involving the use of hard-coded credentials (CWE-798). This flaw can lead to information disclosure and remote code execution when the SOCKS Proxy feature is enabled, which is disabled by default. Exploitation requires knowledge of administrator and PostgreSQL database credentials and high privileges. The vulnerability does not require user interaction but does require some level of authentication. No known exploits are currently reported in the wild. Organizations using affected versions should prioritize patching or mitigating this issue to prevent potential compromise of critical data center management systems.
AI-Powered Analysis
Technical Analysis
CVE-2025-13957 is a vulnerability classified under CWE-798, indicating the use of hard-coded credentials within Schneider Electric's EcoStruxure IT Data Center Expert software, versions 9.0 and earlier. The vulnerability arises specifically when the SOCKS Proxy feature is enabled, which is disabled by default, limiting exposure. The presence of hard-coded credentials for both administrator access and the PostgreSQL database creates a critical security weakness. An attacker with knowledge of these credentials and high privileges could exploit this flaw to disclose sensitive information and execute arbitrary code remotely on the affected system. The CVSS 4.0 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, and the requirement for privileged authentication. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could gain control over the data center management platform, potentially disrupting operations or exfiltrating sensitive data. No patches are currently linked, and no active exploits have been reported, but the risk remains significant due to the critical nature of the affected product in managing IT infrastructure.
Potential Impact
The vulnerability poses a significant risk to organizations relying on Schneider Electric's EcoStruxure IT Data Center Expert for managing critical data center operations. Exploitation could lead to unauthorized access to sensitive infrastructure management data, manipulation or disruption of data center operations, and potential lateral movement within the network. This could result in operational downtime, data breaches, and loss of control over critical IT assets. Given the product's role in data center management, the impact extends to availability and integrity of IT services, potentially affecting business continuity. Organizations in sectors with high dependence on data center uptime, such as finance, healthcare, telecommunications, and manufacturing, face elevated risks. The requirement for privileged credentials limits exploitation to insiders or attackers who have already compromised credentials, but the presence of hard-coded credentials increases the attack surface and risk of credential leakage.
Mitigation Recommendations
Organizations should immediately verify whether the SOCKS Proxy feature is enabled in their EcoStruxure IT Data Center Expert deployments and disable it if not required, as it is disabled by default and its activation increases exposure. They should audit and rotate any hard-coded or default credentials if possible, and enforce strict credential management policies. Network segmentation should be applied to restrict access to the management interface and PostgreSQL database to trusted administrators only. Monitoring and logging should be enhanced to detect unusual access patterns or attempts to use hard-coded credentials. Since no patches are currently available, organizations should engage with Schneider Electric for updates or workarounds. Additionally, implementing multi-factor authentication (MFA) for administrative access can reduce risk. Regular security assessments and penetration testing focused on this product can help identify exploitation attempts early.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- schneider
- Date Reserved
- 2025-12-03T14:05:40.047Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b00fcaea502d3aa84f717e
Added to database: 3/10/2026, 12:34:18 PM
Last enriched: 3/10/2026, 12:48:33 PM
Last updated: 3/10/2026, 1:58:49 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.