CVE-2025-50123: CWE-94 Improper Control of Generation of Code ('Code Injection') in Schneider Electric EcoStruxure™ IT Data Center Expert
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause remote command execution by a privileged account when the server is accessed via a console and through exploitation of the hostname input.
AI Analysis
Technical Summary
CVE-2025-50123 is a high-severity vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects Schneider Electric's EcoStruxure™ IT Data Center Expert product, specifically version 8.3. The flaw arises from insufficient validation or sanitization of the hostname input when accessed via a console by a privileged user. An attacker with privileged access to the server console can exploit this vulnerability by injecting malicious code through the hostname field, leading to remote command execution on the affected system. The vulnerability requires a privileged account and physical or remote console access, but does not require user interaction beyond the attacker’s own actions. The CVSS v4.0 base score is 7.2, indicating a high severity level. The vector metrics indicate that the attack vector is physical (AV:P), with low attack complexity (AC:L), requiring privileged access (PR:H), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). The scope is limited (SI:L), and the security requirements for confidentiality, integrity, and availability are high (SC:H/SI:H/SA:H). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is critical because it allows remote code execution through a trusted interface by leveraging improper input validation, which can lead to full system compromise within data center management environments.
Potential Impact
For European organizations, especially those operating data centers or critical infrastructure managed by Schneider Electric's EcoStruxure™ IT Data Center Expert, this vulnerability poses a significant risk. Exploitation could lead to unauthorized remote command execution, potentially allowing attackers to manipulate data center operations, disrupt services, or gain persistent access to sensitive systems. Given the product's role in monitoring and managing IT infrastructure, successful exploitation could impact confidentiality by exposing sensitive operational data, integrity by altering system configurations or logs, and availability by causing outages or degraded performance. The requirement for privileged access somewhat limits the attack surface; however, insider threats or attackers who have gained privileged credentials could leverage this vulnerability to escalate control. The absence of user interaction requirements means automated exploitation is feasible once access is obtained. European organizations in sectors such as finance, telecommunications, energy, and government, which rely heavily on data center management solutions, could face operational disruptions and data breaches, leading to regulatory compliance issues under GDPR and other local laws.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting privileged console access to trusted personnel only, implementing strict access controls and multi-factor authentication for all privileged accounts. 2. Network segmentation should be enforced to isolate management consoles from general network access, reducing the risk of remote exploitation. 3. Monitor and audit all console access logs for unusual activity, especially changes to hostname configurations or other system parameters. 4. Until an official patch is released, consider implementing input validation controls at the network or application layer to detect and block suspicious hostname inputs. 5. Employ endpoint detection and response (EDR) solutions on servers running EcoStruxure™ IT Data Center Expert to detect anomalous command execution patterns. 6. Develop and test incident response plans specifically for data center management system compromises. 7. Engage with Schneider Electric for timely updates and patches, and plan for rapid deployment once available. 8. Conduct regular security training for privileged users to recognize social engineering or phishing attempts that could lead to credential compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-50123: CWE-94 Improper Control of Generation of Code ('Code Injection') in Schneider Electric EcoStruxure™ IT Data Center Expert
Description
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause remote command execution by a privileged account when the server is accessed via a console and through exploitation of the hostname input.
AI-Powered Analysis
Technical Analysis
CVE-2025-50123 is a high-severity vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects Schneider Electric's EcoStruxure™ IT Data Center Expert product, specifically version 8.3. The flaw arises from insufficient validation or sanitization of the hostname input when accessed via a console by a privileged user. An attacker with privileged access to the server console can exploit this vulnerability by injecting malicious code through the hostname field, leading to remote command execution on the affected system. The vulnerability requires a privileged account and physical or remote console access, but does not require user interaction beyond the attacker’s own actions. The CVSS v4.0 base score is 7.2, indicating a high severity level. The vector metrics indicate that the attack vector is physical (AV:P), with low attack complexity (AC:L), requiring privileged access (PR:H), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). The scope is limited (SI:L), and the security requirements for confidentiality, integrity, and availability are high (SC:H/SI:H/SA:H). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is critical because it allows remote code execution through a trusted interface by leveraging improper input validation, which can lead to full system compromise within data center management environments.
Potential Impact
For European organizations, especially those operating data centers or critical infrastructure managed by Schneider Electric's EcoStruxure™ IT Data Center Expert, this vulnerability poses a significant risk. Exploitation could lead to unauthorized remote command execution, potentially allowing attackers to manipulate data center operations, disrupt services, or gain persistent access to sensitive systems. Given the product's role in monitoring and managing IT infrastructure, successful exploitation could impact confidentiality by exposing sensitive operational data, integrity by altering system configurations or logs, and availability by causing outages or degraded performance. The requirement for privileged access somewhat limits the attack surface; however, insider threats or attackers who have gained privileged credentials could leverage this vulnerability to escalate control. The absence of user interaction requirements means automated exploitation is feasible once access is obtained. European organizations in sectors such as finance, telecommunications, energy, and government, which rely heavily on data center management solutions, could face operational disruptions and data breaches, leading to regulatory compliance issues under GDPR and other local laws.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting privileged console access to trusted personnel only, implementing strict access controls and multi-factor authentication for all privileged accounts. 2. Network segmentation should be enforced to isolate management consoles from general network access, reducing the risk of remote exploitation. 3. Monitor and audit all console access logs for unusual activity, especially changes to hostname configurations or other system parameters. 4. Until an official patch is released, consider implementing input validation controls at the network or application layer to detect and block suspicious hostname inputs. 5. Employ endpoint detection and response (EDR) solutions on servers running EcoStruxure™ IT Data Center Expert to detect anomalous command execution patterns. 6. Develop and test incident response plans specifically for data center management system compromises. 7. Engage with Schneider Electric for timely updates and patches, and plan for rapid deployment once available. 8. Conduct regular security training for privileged users to recognize social engineering or phishing attempts that could lead to credential compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- schneider
- Date Reserved
- 2025-06-12T13:53:23.603Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6870e465a83201eaacadfdf7
Added to database: 7/11/2025, 10:16:05 AM
Last enriched: 7/18/2025, 9:19:31 PM
Last updated: 8/23/2025, 6:03:10 PM
Views: 25
Related Threats
CVE-2025-9409: Path Traversal in lostvip-com ruoyi-go
MediumCVE-2025-53119: CWE-434 Unrestricted Upload of File with Dangerous Type in Securden Unified PAM
HighCVE-2025-53118: CWE-306 Missing Authentication for Critical Function in Securden Unified PAM
CriticalCVE-2025-55574: n/a
MediumCVE-2025-3478: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OpenText OpenText Enterprise Security Manager
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.