CVE-2025-46744: CWE-863 Incorrect Authorization in Schweitzer Engineering Laboratories SEL Blueframe OS
An authenticated administrator could modify the Created By username for a user account
AI Analysis
Technical Summary
CVE-2025-46744 is a security vulnerability classified under CWE-863 (Incorrect Authorization) affecting the SEL Blueframe OS developed by Schweitzer Engineering Laboratories. The vulnerability allows an authenticated administrator to modify the 'Created By' username attribute for a user account. This means that an administrator with valid credentials can alter metadata related to user account creation, potentially misleading audit trails or accountability mechanisms. The vulnerability does not allow unauthorized access or privilege escalation beyond the administrator level, nor does it impact confidentiality or availability directly. The CVSS v3.1 base score is 2.7 (low severity), reflecting that the attack vector is network-based, requires low attack complexity, but high privileges (administrator authentication) and no user interaction. The impact is limited to integrity, specifically the integrity of audit or user metadata. There are no known exploits in the wild, and no patches have been linked yet. The affected product is SEL Blueframe OS, a specialized operating system used primarily in industrial control systems and critical infrastructure environments, especially in electrical grid management and automation.
Potential Impact
For European organizations, particularly those operating critical infrastructure such as power utilities, this vulnerability could undermine the reliability of audit logs and user accountability. While it does not allow direct unauthorized access or disruption, the ability for an administrator to falsify the 'Created By' field could be exploited in insider threat scenarios or during forensic investigations to obscure actions taken on user accounts. This could complicate incident response and compliance with regulatory requirements such as NIS2 Directive or GDPR, which emphasize accountability and traceability. The impact is more subtle and indirect but important in environments where strict audit integrity is mandated. Since SEL Blueframe OS is used in industrial control systems, any degradation of trust in system logs can affect operational security and regulatory compliance in European critical infrastructure sectors.
Mitigation Recommendations
Organizations should implement strict administrative controls and separation of duties to minimize the risk of misuse by authenticated administrators. Monitoring and alerting on changes to user account metadata, including the 'Created By' field, should be enhanced to detect suspicious modifications. Implementing immutable logging or external log aggregation with tamper-evident mechanisms can help preserve audit trail integrity. Regular audits of user account metadata and cross-verification with other system logs can identify inconsistencies. Since no patch is currently available, organizations should engage with Schweitzer Engineering Laboratories for updates and consider compensating controls such as enhanced monitoring and administrative process reviews. Additionally, restricting administrator access to only those who require it and enforcing multi-factor authentication can reduce risk.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Sweden
CVE-2025-46744: CWE-863 Incorrect Authorization in Schweitzer Engineering Laboratories SEL Blueframe OS
Description
An authenticated administrator could modify the Created By username for a user account
AI-Powered Analysis
Technical Analysis
CVE-2025-46744 is a security vulnerability classified under CWE-863 (Incorrect Authorization) affecting the SEL Blueframe OS developed by Schweitzer Engineering Laboratories. The vulnerability allows an authenticated administrator to modify the 'Created By' username attribute for a user account. This means that an administrator with valid credentials can alter metadata related to user account creation, potentially misleading audit trails or accountability mechanisms. The vulnerability does not allow unauthorized access or privilege escalation beyond the administrator level, nor does it impact confidentiality or availability directly. The CVSS v3.1 base score is 2.7 (low severity), reflecting that the attack vector is network-based, requires low attack complexity, but high privileges (administrator authentication) and no user interaction. The impact is limited to integrity, specifically the integrity of audit or user metadata. There are no known exploits in the wild, and no patches have been linked yet. The affected product is SEL Blueframe OS, a specialized operating system used primarily in industrial control systems and critical infrastructure environments, especially in electrical grid management and automation.
Potential Impact
For European organizations, particularly those operating critical infrastructure such as power utilities, this vulnerability could undermine the reliability of audit logs and user accountability. While it does not allow direct unauthorized access or disruption, the ability for an administrator to falsify the 'Created By' field could be exploited in insider threat scenarios or during forensic investigations to obscure actions taken on user accounts. This could complicate incident response and compliance with regulatory requirements such as NIS2 Directive or GDPR, which emphasize accountability and traceability. The impact is more subtle and indirect but important in environments where strict audit integrity is mandated. Since SEL Blueframe OS is used in industrial control systems, any degradation of trust in system logs can affect operational security and regulatory compliance in European critical infrastructure sectors.
Mitigation Recommendations
Organizations should implement strict administrative controls and separation of duties to minimize the risk of misuse by authenticated administrators. Monitoring and alerting on changes to user account metadata, including the 'Created By' field, should be enhanced to detect suspicious modifications. Implementing immutable logging or external log aggregation with tamper-evident mechanisms can help preserve audit trail integrity. Regular audits of user account metadata and cross-verification with other system logs can identify inconsistencies. Since no patch is currently available, organizations should engage with Schweitzer Engineering Laboratories for updates and consider compensating controls such as enhanced monitoring and administrative process reviews. Additionally, restricting administrator access to only those who require it and enforcing multi-factor authentication can reduce risk.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEL
- Date Reserved
- 2025-04-28T21:27:38.848Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6aa6
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 10/2/2025, 12:13:50 AM
Last updated: 1/7/2026, 4:21:55 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.