Skip to main content

CVE-2025-46744: CWE-863 Incorrect Authorization in Schweitzer Engineering Laboratories SEL Blueframe OS

Low
VulnerabilityCVE-2025-46744cvecve-2025-46744cwe-863
Published: Mon May 12 2025 (05/12/2025, 16:10:29 UTC)
Source: CVE
Vendor/Project: Schweitzer Engineering Laboratories
Product: SEL Blueframe OS

Description

An authenticated administrator could modify the Created By username for a user account

AI-Powered Analysis

AILast updated: 10/02/2025, 00:13:50 UTC

Technical Analysis

CVE-2025-46744 is a security vulnerability classified under CWE-863 (Incorrect Authorization) affecting the SEL Blueframe OS developed by Schweitzer Engineering Laboratories. The vulnerability allows an authenticated administrator to modify the 'Created By' username attribute for a user account. This means that an administrator with valid credentials can alter metadata related to user account creation, potentially misleading audit trails or accountability mechanisms. The vulnerability does not allow unauthorized access or privilege escalation beyond the administrator level, nor does it impact confidentiality or availability directly. The CVSS v3.1 base score is 2.7 (low severity), reflecting that the attack vector is network-based, requires low attack complexity, but high privileges (administrator authentication) and no user interaction. The impact is limited to integrity, specifically the integrity of audit or user metadata. There are no known exploits in the wild, and no patches have been linked yet. The affected product is SEL Blueframe OS, a specialized operating system used primarily in industrial control systems and critical infrastructure environments, especially in electrical grid management and automation.

Potential Impact

For European organizations, particularly those operating critical infrastructure such as power utilities, this vulnerability could undermine the reliability of audit logs and user accountability. While it does not allow direct unauthorized access or disruption, the ability for an administrator to falsify the 'Created By' field could be exploited in insider threat scenarios or during forensic investigations to obscure actions taken on user accounts. This could complicate incident response and compliance with regulatory requirements such as NIS2 Directive or GDPR, which emphasize accountability and traceability. The impact is more subtle and indirect but important in environments where strict audit integrity is mandated. Since SEL Blueframe OS is used in industrial control systems, any degradation of trust in system logs can affect operational security and regulatory compliance in European critical infrastructure sectors.

Mitigation Recommendations

Organizations should implement strict administrative controls and separation of duties to minimize the risk of misuse by authenticated administrators. Monitoring and alerting on changes to user account metadata, including the 'Created By' field, should be enhanced to detect suspicious modifications. Implementing immutable logging or external log aggregation with tamper-evident mechanisms can help preserve audit trail integrity. Regular audits of user account metadata and cross-verification with other system logs can identify inconsistencies. Since no patch is currently available, organizations should engage with Schweitzer Engineering Laboratories for updates and consider compensating controls such as enhanced monitoring and administrative process reviews. Additionally, restricting administrator access to only those who require it and enforcing multi-factor authentication can reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SEL
Date Reserved
2025-04-28T21:27:38.848Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6aa6

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 10/2/2025, 12:13:50 AM

Last updated: 10/2/2025, 12:13:50 AM

Views: 26

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats