CVE-2025-46744: CWE-863 Incorrect Authorization in Schweitzer Engineering Laboratories SEL Blueframe OS
An authenticated administrator could modify the Created By username for a user account
AI Analysis
Technical Summary
CVE-2025-46744 is a security vulnerability classified under CWE-863 (Incorrect Authorization) affecting the SEL Blueframe OS developed by Schweitzer Engineering Laboratories. The vulnerability allows an authenticated administrator to modify the 'Created By' username attribute for a user account. This means that an administrator with valid credentials can alter metadata related to user account creation, potentially misleading audit trails or accountability mechanisms. The vulnerability does not allow unauthorized access or privilege escalation beyond the administrator level, nor does it impact confidentiality or availability directly. The CVSS v3.1 base score is 2.7 (low severity), reflecting that the attack vector is network-based, requires low attack complexity, but high privileges (administrator authentication) and no user interaction. The impact is limited to integrity, specifically the integrity of audit or user metadata. There are no known exploits in the wild, and no patches have been linked yet. The affected product is SEL Blueframe OS, a specialized operating system used primarily in industrial control systems and critical infrastructure environments, especially in electrical grid management and automation.
Potential Impact
For European organizations, particularly those operating critical infrastructure such as power utilities, this vulnerability could undermine the reliability of audit logs and user accountability. While it does not allow direct unauthorized access or disruption, the ability for an administrator to falsify the 'Created By' field could be exploited in insider threat scenarios or during forensic investigations to obscure actions taken on user accounts. This could complicate incident response and compliance with regulatory requirements such as NIS2 Directive or GDPR, which emphasize accountability and traceability. The impact is more subtle and indirect but important in environments where strict audit integrity is mandated. Since SEL Blueframe OS is used in industrial control systems, any degradation of trust in system logs can affect operational security and regulatory compliance in European critical infrastructure sectors.
Mitigation Recommendations
Organizations should implement strict administrative controls and separation of duties to minimize the risk of misuse by authenticated administrators. Monitoring and alerting on changes to user account metadata, including the 'Created By' field, should be enhanced to detect suspicious modifications. Implementing immutable logging or external log aggregation with tamper-evident mechanisms can help preserve audit trail integrity. Regular audits of user account metadata and cross-verification with other system logs can identify inconsistencies. Since no patch is currently available, organizations should engage with Schweitzer Engineering Laboratories for updates and consider compensating controls such as enhanced monitoring and administrative process reviews. Additionally, restricting administrator access to only those who require it and enforcing multi-factor authentication can reduce risk.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Sweden
CVE-2025-46744: CWE-863 Incorrect Authorization in Schweitzer Engineering Laboratories SEL Blueframe OS
Description
An authenticated administrator could modify the Created By username for a user account
AI-Powered Analysis
Technical Analysis
CVE-2025-46744 is a security vulnerability classified under CWE-863 (Incorrect Authorization) affecting the SEL Blueframe OS developed by Schweitzer Engineering Laboratories. The vulnerability allows an authenticated administrator to modify the 'Created By' username attribute for a user account. This means that an administrator with valid credentials can alter metadata related to user account creation, potentially misleading audit trails or accountability mechanisms. The vulnerability does not allow unauthorized access or privilege escalation beyond the administrator level, nor does it impact confidentiality or availability directly. The CVSS v3.1 base score is 2.7 (low severity), reflecting that the attack vector is network-based, requires low attack complexity, but high privileges (administrator authentication) and no user interaction. The impact is limited to integrity, specifically the integrity of audit or user metadata. There are no known exploits in the wild, and no patches have been linked yet. The affected product is SEL Blueframe OS, a specialized operating system used primarily in industrial control systems and critical infrastructure environments, especially in electrical grid management and automation.
Potential Impact
For European organizations, particularly those operating critical infrastructure such as power utilities, this vulnerability could undermine the reliability of audit logs and user accountability. While it does not allow direct unauthorized access or disruption, the ability for an administrator to falsify the 'Created By' field could be exploited in insider threat scenarios or during forensic investigations to obscure actions taken on user accounts. This could complicate incident response and compliance with regulatory requirements such as NIS2 Directive or GDPR, which emphasize accountability and traceability. The impact is more subtle and indirect but important in environments where strict audit integrity is mandated. Since SEL Blueframe OS is used in industrial control systems, any degradation of trust in system logs can affect operational security and regulatory compliance in European critical infrastructure sectors.
Mitigation Recommendations
Organizations should implement strict administrative controls and separation of duties to minimize the risk of misuse by authenticated administrators. Monitoring and alerting on changes to user account metadata, including the 'Created By' field, should be enhanced to detect suspicious modifications. Implementing immutable logging or external log aggregation with tamper-evident mechanisms can help preserve audit trail integrity. Regular audits of user account metadata and cross-verification with other system logs can identify inconsistencies. Since no patch is currently available, organizations should engage with Schweitzer Engineering Laboratories for updates and consider compensating controls such as enhanced monitoring and administrative process reviews. Additionally, restricting administrator access to only those who require it and enforcing multi-factor authentication can reduce risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEL
- Date Reserved
- 2025-04-28T21:27:38.848Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6aa6
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 10/2/2025, 12:13:50 AM
Last updated: 10/2/2025, 12:13:50 AM
Views: 26
Related Threats
CVE-2025-59774: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in AndSoft e-TMS
MediumCVE-2025-59773: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in AndSoft e-TMS
MediumCVE-2025-59772: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in AndSoft e-TMS
MediumCVE-2025-61087: n/a
MediumCVE-2025-59771: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in AndSoft e-TMS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.