Skip to main content

CVE-2025-3916: CWE-121: Stack-based Buffer Overflow in Schneider Electric EcoStruxure™ Power Build Rapsody software

Medium
VulnerabilityCVE-2025-3916cvecve-2025-3916cwe-121
Published: Tue May 13 2025 (05/13/2025, 08:35:01 UTC)
Source: CVE
Vendor/Project: Schneider Electric
Product: EcoStruxure™ Power Build Rapsody software

Description

CWE-121: Stack-based Buffer Overflow vulnerability exists that could cause local attackers being able to exploit these issues to potentially execute arbitrary code while the end user opens a malicious project file (SSD file) provided by the attacker.

AI-Powered Analysis

AILast updated: 07/12/2025, 02:04:01 UTC

Technical Analysis

CVE-2025-3916 is a stack-based buffer overflow vulnerability (CWE-121) identified in Schneider Electric's EcoStruxure™ Power Build Rapsody software, specifically affecting versions 2.7.12 FR and prior. This vulnerability arises when the software processes specially crafted project files with the .SSD extension. A local attacker can exploit this flaw by convincing an end user to open a malicious SSD project file, which triggers the buffer overflow condition on the stack. This overflow can potentially allow the attacker to execute arbitrary code within the context of the affected application. The vulnerability does not require elevated privileges or prior authentication but does require user interaction in the form of opening the malicious file. The CVSS 4.0 base score is 4.6 (medium severity), reflecting the local attack vector, low complexity, no privileges required, but requiring user interaction and having limited impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability is significant because EcoStruxure Power Build Rapsody is used in industrial and power management environments, where unauthorized code execution could lead to disruption of critical infrastructure operations or manipulation of power system configurations.

Potential Impact

For European organizations, especially those in the energy, utilities, and industrial automation sectors, this vulnerability poses a risk of unauthorized code execution on workstations running the affected software. Successful exploitation could lead to manipulation or disruption of power system configurations, potentially causing operational downtime or safety hazards. Although exploitation requires local access and user interaction, targeted spear-phishing or social engineering attacks could deliver malicious SSD files to operators or engineers. The impact on confidentiality is limited, but integrity and availability of power management configurations could be compromised, which is critical in regulated European energy markets. This could also lead to regulatory compliance issues under frameworks like NIS2 and GDPR if operational disruptions or data breaches occur. The absence of known exploits reduces immediate risk, but the critical nature of the affected systems warrants proactive mitigation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict access to EcoStruxure Power Build Rapsody software to trusted personnel only and enforce strict user permissions to limit local access. 2) Educate users, especially engineers and operators, about the risks of opening unsolicited or unexpected SSD project files and implement policies to verify file sources before opening. 3) Employ application whitelisting and endpoint protection solutions capable of detecting anomalous behavior or code execution attempts originating from the software. 4) Monitor system logs and network activity for unusual patterns that could indicate exploitation attempts. 5) Coordinate with Schneider Electric for timely updates or patches and plan for rapid deployment once available. 6) Consider isolating systems running this software from broader corporate networks to reduce attack surface. 7) Implement strict file integrity monitoring on project files and related directories to detect unauthorized changes or additions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-04-24T08:15:07.665Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd65b7

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 2:04:01 AM

Last updated: 8/12/2025, 8:44:45 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats