Skip to main content

CVE-2025-50121: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Schneider Electric EcoStruxure™ IT Data Center Expert

Critical
VulnerabilityCVE-2025-50121cvecve-2025-50121cwe-78
Published: Fri Jul 11 2025 (07/11/2025, 09:14:55 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EcoStruxure™ IT Data Center Expert

Description

A CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that could cause unauthenticated remote code execution when a malicious folder is created over the web interface HTTP when enabled. HTTP is disabled by default.

AI-Powered Analysis

AILast updated: 07/18/2025, 21:20:18 UTC

Technical Analysis

CVE-2025-50121 is a critical vulnerability classified under CWE-78, which pertains to improper neutralization of special elements used in OS commands, commonly known as OS Command Injection. This vulnerability affects Schneider Electric's EcoStruxure™ IT Data Center Expert product, specifically version 8.3. The flaw arises from insufficient sanitization of input when creating folders via the product's web interface over HTTP. If HTTP is enabled (which is disabled by default), an attacker can create a malicious folder name that includes special characters or command sequences that the system improperly processes, leading to remote code execution (RCE) without requiring authentication or user interaction. The vulnerability has a CVSS v4.0 base score of 9.5, indicating critical severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). The scope is limited (SI:L) but the severity is high (SA:H). No known exploits are currently reported in the wild, but the potential for unauthenticated RCE makes this a highly dangerous vulnerability. The vulnerability is specifically triggered when the HTTP interface is enabled, which is off by default, reducing the attack surface but still posing a significant risk if administrators enable HTTP for management convenience or due to misconfiguration. The lack of available patches at the time of publication further elevates the urgency for mitigation.

Potential Impact

For European organizations, the impact of this vulnerability could be severe, especially for data centers and critical infrastructure managed using Schneider Electric's EcoStruxure IT Data Center Expert. Successful exploitation could allow attackers to execute arbitrary commands remotely without authentication, potentially leading to full system compromise, data theft, disruption of data center operations, and lateral movement within the network. This could affect confidentiality, integrity, and availability of critical IT infrastructure, causing operational downtime, financial losses, and reputational damage. Given Schneider Electric's strong market presence in Europe, particularly in sectors like energy, manufacturing, and critical infrastructure, the risk is amplified. Organizations relying on this product for data center management must consider the possibility of targeted attacks aiming to disrupt essential services or gain footholds for further intrusion. The vulnerability's exploitation could also contravene European data protection regulations (e.g., GDPR) if personal or sensitive data is compromised, leading to legal and compliance repercussions.

Mitigation Recommendations

1. Immediately verify if the HTTP interface is enabled on EcoStruxure IT Data Center Expert installations. If enabled, disable HTTP access and switch to secure management interfaces such as HTTPS or VPN-based access. 2. Apply strict network segmentation and firewall rules to restrict access to the management interface only to trusted administrative networks. 3. Monitor network traffic and logs for unusual folder creation requests or suspicious activity on the web interface. 4. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting command injection attempts. 5. Coordinate with Schneider Electric for timely patch releases and apply security updates as soon as they become available. 6. Conduct security audits and penetration testing focused on management interfaces to identify and remediate similar vulnerabilities. 7. Educate IT staff on secure configuration practices and the risks of enabling insecure protocols like HTTP for management access. 8. Consider deploying web application firewalls (WAF) that can filter and block malicious input patterns targeting command injection flaws.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-06-12T13:53:23.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6870d9daa83201eaacada66c

Added to database: 7/11/2025, 9:31:06 AM

Last enriched: 7/18/2025, 9:20:18 PM

Last updated: 8/22/2025, 2:44:17 AM

Views: 39

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats