Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13957: CWE-798: Use of Hard-coded Credentials in Schneider Electric EcoStruxure™ IT Data Center Expert

0
High
VulnerabilityCVE-2025-13957cvecve-2025-13957cwe-798
Published: Tue Mar 10 2026 (03/10/2026, 12:19:04 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EcoStruxure™ IT Data Center Expert

Description

CVE-2025-13957 is a high-severity vulnerability in Schneider Electric's EcoStruxure IT Data Center Expert (version 9. 0 and prior) involving the use of hard-coded credentials (CWE-798). This flaw can lead to information disclosure and remote code execution when the SOCKS Proxy feature is enabled, which is disabled by default. Exploitation requires knowledge of administrator and PostgreSQL database credentials and high privileges. The vulnerability does not require user interaction but does require some level of authentication. No known exploits are currently reported in the wild. Organizations using affected versions should prioritize patching or mitigating this issue to prevent potential compromise of critical data center management systems.

AI-Powered Analysis

AILast updated: 03/10/2026, 12:48:33 UTC

Technical Analysis

CVE-2025-13957 is a vulnerability classified under CWE-798, indicating the use of hard-coded credentials within Schneider Electric's EcoStruxure IT Data Center Expert software, versions 9.0 and earlier. The vulnerability arises specifically when the SOCKS Proxy feature is enabled, which is disabled by default, limiting exposure. The presence of hard-coded credentials for both administrator access and the PostgreSQL database creates a critical security weakness. An attacker with knowledge of these credentials and high privileges could exploit this flaw to disclose sensitive information and execute arbitrary code remotely on the affected system. The CVSS 4.0 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, and the requirement for privileged authentication. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could gain control over the data center management platform, potentially disrupting operations or exfiltrating sensitive data. No patches are currently linked, and no active exploits have been reported, but the risk remains significant due to the critical nature of the affected product in managing IT infrastructure.

Potential Impact

The vulnerability poses a significant risk to organizations relying on Schneider Electric's EcoStruxure IT Data Center Expert for managing critical data center operations. Exploitation could lead to unauthorized access to sensitive infrastructure management data, manipulation or disruption of data center operations, and potential lateral movement within the network. This could result in operational downtime, data breaches, and loss of control over critical IT assets. Given the product's role in data center management, the impact extends to availability and integrity of IT services, potentially affecting business continuity. Organizations in sectors with high dependence on data center uptime, such as finance, healthcare, telecommunications, and manufacturing, face elevated risks. The requirement for privileged credentials limits exploitation to insiders or attackers who have already compromised credentials, but the presence of hard-coded credentials increases the attack surface and risk of credential leakage.

Mitigation Recommendations

Organizations should immediately verify whether the SOCKS Proxy feature is enabled in their EcoStruxure IT Data Center Expert deployments and disable it if not required, as it is disabled by default and its activation increases exposure. They should audit and rotate any hard-coded or default credentials if possible, and enforce strict credential management policies. Network segmentation should be applied to restrict access to the management interface and PostgreSQL database to trusted administrators only. Monitoring and logging should be enhanced to detect unusual access patterns or attempts to use hard-coded credentials. Since no patches are currently available, organizations should engage with Schneider Electric for updates or workarounds. Additionally, implementing multi-factor authentication (MFA) for administrative access can reduce risk. Regular security assessments and penetration testing focused on this product can help identify exploitation attempts early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
schneider
Date Reserved
2025-12-03T14:05:40.047Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b00fcaea502d3aa84f717e

Added to database: 3/10/2026, 12:34:18 PM

Last enriched: 3/10/2026, 12:48:33 PM

Last updated: 3/10/2026, 1:58:49 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses