CVE-2025-50123: CWE-94 Improper Control of Generation of Code ('Code Injection') in Schneider Electric EcoStruxure™ IT Data Center Expert
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause remote command execution by a privileged account when the server is accessed via a console and through exploitation of the hostname input.
AI Analysis
Technical Summary
CVE-2025-50123 is a vulnerability classified under CWE-94, indicating improper control over code generation, specifically code injection. It affects Schneider Electric's EcoStruxure™ IT Data Center Expert version 8.3. The flaw arises from insufficient validation or sanitization of the hostname input when accessed via the server console, allowing a privileged user to inject malicious code. This leads to remote command execution on the server, potentially compromising the entire system. The attack vector is partially network-based (AV:P), requiring low attack complexity (AC:L), privileged authentication (PR:H), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H). The scope is limited (SI:L), and security requirements for attack success are high (SA:H). No public exploits or patches are currently available, but the risk is significant given the critical role of the product in managing data center infrastructure. The vulnerability could allow attackers to execute arbitrary commands, manipulate system configurations, disrupt operations, or exfiltrate sensitive data. The vulnerability's presence in a widely used data center management platform increases its potential impact on organizations relying on Schneider Electric's solutions for operational continuity and security.
Potential Impact
For European organizations, the impact of CVE-2025-50123 is substantial, especially those operating critical data centers or industrial environments managed by Schneider Electric's EcoStruxure IT Data Center Expert. Successful exploitation could lead to unauthorized remote command execution, enabling attackers to disrupt data center operations, manipulate infrastructure controls, or access sensitive operational data. This could result in downtime, data breaches, or cascading failures affecting dependent services. Given the privileged access requirement, insider threats or compromised privileged accounts pose a significant risk vector. The high confidentiality, integrity, and availability impact could affect sectors such as finance, healthcare, energy, and manufacturing, where data center reliability and security are paramount. The lack of current patches increases exposure, necessitating immediate risk management. Additionally, disruption in critical infrastructure could have broader economic and societal consequences within Europe.
Mitigation Recommendations
1. Restrict access to the EcoStruxure IT Data Center Expert console strictly to trusted, authenticated privileged users and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Implement network segmentation and firewall rules to limit console access to secure management networks only. 3. Monitor and log all console access and hostname input activities for unusual or unauthorized commands or patterns indicative of code injection attempts. 4. Apply strict input validation and sanitization controls on hostname inputs at the application level, if possible, through configuration or vendor guidance. 5. Maintain up-to-date backups and incident response plans tailored to data center management systems. 6. Engage with Schneider Electric for timely updates or patches and subscribe to their security advisories. 7. Conduct regular security assessments and penetration testing focusing on privileged access paths and input validation controls. 8. Educate privileged users on the risks of code injection and secure operational practices to reduce insider threat risks.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden, Belgium, Spain
CVE-2025-50123: CWE-94 Improper Control of Generation of Code ('Code Injection') in Schneider Electric EcoStruxure™ IT Data Center Expert
Description
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause remote command execution by a privileged account when the server is accessed via a console and through exploitation of the hostname input.
AI-Powered Analysis
Technical Analysis
CVE-2025-50123 is a vulnerability classified under CWE-94, indicating improper control over code generation, specifically code injection. It affects Schneider Electric's EcoStruxure™ IT Data Center Expert version 8.3. The flaw arises from insufficient validation or sanitization of the hostname input when accessed via the server console, allowing a privileged user to inject malicious code. This leads to remote command execution on the server, potentially compromising the entire system. The attack vector is partially network-based (AV:P), requiring low attack complexity (AC:L), privileged authentication (PR:H), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H). The scope is limited (SI:L), and security requirements for attack success are high (SA:H). No public exploits or patches are currently available, but the risk is significant given the critical role of the product in managing data center infrastructure. The vulnerability could allow attackers to execute arbitrary commands, manipulate system configurations, disrupt operations, or exfiltrate sensitive data. The vulnerability's presence in a widely used data center management platform increases its potential impact on organizations relying on Schneider Electric's solutions for operational continuity and security.
Potential Impact
For European organizations, the impact of CVE-2025-50123 is substantial, especially those operating critical data centers or industrial environments managed by Schneider Electric's EcoStruxure IT Data Center Expert. Successful exploitation could lead to unauthorized remote command execution, enabling attackers to disrupt data center operations, manipulate infrastructure controls, or access sensitive operational data. This could result in downtime, data breaches, or cascading failures affecting dependent services. Given the privileged access requirement, insider threats or compromised privileged accounts pose a significant risk vector. The high confidentiality, integrity, and availability impact could affect sectors such as finance, healthcare, energy, and manufacturing, where data center reliability and security are paramount. The lack of current patches increases exposure, necessitating immediate risk management. Additionally, disruption in critical infrastructure could have broader economic and societal consequences within Europe.
Mitigation Recommendations
1. Restrict access to the EcoStruxure IT Data Center Expert console strictly to trusted, authenticated privileged users and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Implement network segmentation and firewall rules to limit console access to secure management networks only. 3. Monitor and log all console access and hostname input activities for unusual or unauthorized commands or patterns indicative of code injection attempts. 4. Apply strict input validation and sanitization controls on hostname inputs at the application level, if possible, through configuration or vendor guidance. 5. Maintain up-to-date backups and incident response plans tailored to data center management systems. 6. Engage with Schneider Electric for timely updates or patches and subscribe to their security advisories. 7. Conduct regular security assessments and penetration testing focusing on privileged access paths and input validation controls. 8. Educate privileged users on the risks of code injection and secure operational practices to reduce insider threat risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- schneider
- Date Reserved
- 2025-06-12T13:53:23.603Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6870e465a83201eaacadfdf7
Added to database: 7/11/2025, 10:16:05 AM
Last enriched: 11/11/2025, 6:25:00 AM
Last updated: 11/23/2025, 9:47:15 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13544: Unrestricted Upload in ashraf-kabir travel-agency
MediumCVE-2025-13197
UnknownCVE-2025-12561
UnknownCVE-2025-12541
UnknownCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.