Skip to main content

CVE-2025-50121: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Schneider Electric EcoStruxure IT Data Center Expert

Critical
VulnerabilityCVE-2025-50121cvecve-2025-50121cwe-78
Published: Fri Jul 11 2025 (07/11/2025, 09:14:55 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EcoStruxure IT Data Center Expert

Description

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that could cause unauthenticated remote code execution when a malicious folder is created over the web interface HTTP when enabled. HTTP is disabled by default.

AI-Powered Analysis

AILast updated: 07/11/2025, 09:46:24 UTC

Technical Analysis

CVE-2025-50121 is a critical OS command injection vulnerability (CWE-78) affecting Schneider Electric's EcoStruxure IT Data Center Expert product, specifically versions 8.3 and prior. The vulnerability arises due to improper neutralization of special elements in user-supplied input, allowing an attacker to inject arbitrary OS commands. The attack vector involves creating a malicious folder via the product's web interface over HTTP when HTTP access is enabled. Notably, HTTP access is disabled by default, which reduces the attack surface but does not eliminate risk if HTTP is enabled. The vulnerability allows unauthenticated remote code execution (RCE), meaning an attacker does not require valid credentials or user interaction to exploit it. The CVSS 4.0 base score is 9.5, reflecting a critical severity level due to the combination of network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The vulnerability could enable attackers to execute arbitrary commands on the underlying operating system hosting the EcoStruxure IT Data Center Expert software, potentially leading to full system compromise, data theft, disruption of data center operations, or pivoting to other internal systems. No known exploits are currently reported in the wild, but the severity and ease of exploitation make this a high-risk issue that requires immediate attention. The lack of available patches at the time of publication further increases the urgency for mitigation through configuration changes and network controls.

Potential Impact

For European organizations, especially those operating data centers or critical infrastructure managed by Schneider Electric's EcoStruxure IT Data Center Expert, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized remote code execution, enabling attackers to disrupt data center operations, manipulate or steal sensitive data, and potentially cause cascading failures in connected systems. Given the critical role of data centers in supporting cloud services, financial institutions, healthcare, manufacturing, and government operations across Europe, the impact could be widespread and severe. The ability to exploit this vulnerability without authentication and user interaction increases the risk of automated attacks and rapid compromise. Additionally, the potential for high confidentiality, integrity, and availability impacts means that organizations could face data breaches, operational downtime, regulatory penalties under GDPR, and reputational damage. The fact that HTTP access is disabled by default mitigates risk somewhat, but misconfigurations or legacy deployments enabling HTTP could expose organizations inadvertently. The absence of known exploits currently provides a window for proactive defense, but the critical nature demands swift action.

Mitigation Recommendations

1. Immediately verify and ensure that HTTP access to the EcoStruxure IT Data Center Expert web interface remains disabled unless absolutely necessary. Prefer HTTPS-only configurations to reduce exposure. 2. If HTTP must be enabled temporarily, restrict access to the web interface using network-level controls such as firewalls, VPNs, or IP whitelisting to limit exposure to trusted administrators only. 3. Monitor network traffic and logs for any suspicious folder creation attempts or unusual commands executed on the server hosting the product. 4. Apply strict input validation and sanitization on any user-supplied data interacting with the system, if custom integrations or scripts are used. 5. Coordinate with Schneider Electric for timely patch releases and apply security updates as soon as they become available. 6. Conduct internal audits to identify any instances where HTTP is enabled and remediate immediately. 7. Implement intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns targeting this product. 8. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving this product. 9. Consider network segmentation to isolate the management interfaces of data center infrastructure from general enterprise networks and the internet. 10. Regularly back up critical configurations and data to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-06-12T13:53:23.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6870d9daa83201eaacada66c

Added to database: 7/11/2025, 9:31:06 AM

Last enriched: 7/11/2025, 9:46:24 AM

Last updated: 7/11/2025, 3:31:07 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats