CVE-2025-50123: CWE-94 Improper Control of Generation of Code ('Code Injection') in Schneider Electric EcoStruxure IT Data Center Expert
CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause remote command execution by a privileged account when the server is accessed via a console and through exploitation of the hostname input.
AI Analysis
Technical Summary
CVE-2025-50123 is a high-severity vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects Schneider Electric's EcoStruxure IT Data Center Expert product, specifically versions 8.3 and prior. The flaw arises from insufficient validation or sanitization of the hostname input when accessed via the server console. A privileged account accessing the server console can exploit this vulnerability by injecting malicious code through the hostname field, leading to remote command execution on the affected system. The CVSS 4.0 score of 7.2 reflects a high severity, indicating that the vulnerability requires a privileged user (PR:H) and physical or local access (AV:P) to the server console, but does not require user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), meaning successful exploitation could lead to full system compromise. The scope is limited (SI:L) to the affected component, and the attack complexity is low (AC:L), suggesting that once the attacker has the required privileges and access, exploitation is straightforward. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on compensating controls until an official fix is released.
Potential Impact
For European organizations, especially those operating data centers or critical infrastructure managed via Schneider Electric's EcoStruxure IT Data Center Expert, this vulnerability poses a significant risk. Successful exploitation could allow attackers with privileged access to execute arbitrary commands remotely, potentially leading to unauthorized control over data center management systems. This could disrupt operations, compromise sensitive data, or facilitate further lateral movement within the network. Given the critical role of data center management in sectors such as finance, healthcare, manufacturing, and energy, the impact could extend to service outages, data breaches, and regulatory non-compliance under GDPR. The requirement for privileged access and console-level interaction somewhat limits the attack surface but does not eliminate risk, as insider threats or compromised administrative accounts could be leveraged. Additionally, the high impact on confidentiality, integrity, and availability underscores the potential for severe operational and reputational damage.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict and monitor privileged access to the EcoStruxure IT Data Center Expert consoles, ensuring only authorized personnel can access the server console. 2) Enforce strict input validation and sanitization policies at the application layer, if possible, to mitigate injection risks until a patch is available. 3) Employ network segmentation and access controls to limit console access to secure management networks, reducing exposure. 4) Implement robust logging and real-time monitoring of console access and hostname changes to detect suspicious activities promptly. 5) Conduct regular audits of privileged accounts and enforce multi-factor authentication to reduce the risk of credential compromise. 6) Stay in close contact with Schneider Electric for timely patch releases and apply updates immediately upon availability. 7) Consider deploying application-layer firewalls or intrusion prevention systems capable of detecting anomalous command injection attempts targeting the hostname input.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-50123: CWE-94 Improper Control of Generation of Code ('Code Injection') in Schneider Electric EcoStruxure IT Data Center Expert
Description
CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause remote command execution by a privileged account when the server is accessed via a console and through exploitation of the hostname input.
AI-Powered Analysis
Technical Analysis
CVE-2025-50123 is a high-severity vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects Schneider Electric's EcoStruxure IT Data Center Expert product, specifically versions 8.3 and prior. The flaw arises from insufficient validation or sanitization of the hostname input when accessed via the server console. A privileged account accessing the server console can exploit this vulnerability by injecting malicious code through the hostname field, leading to remote command execution on the affected system. The CVSS 4.0 score of 7.2 reflects a high severity, indicating that the vulnerability requires a privileged user (PR:H) and physical or local access (AV:P) to the server console, but does not require user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), meaning successful exploitation could lead to full system compromise. The scope is limited (SI:L) to the affected component, and the attack complexity is low (AC:L), suggesting that once the attacker has the required privileges and access, exploitation is straightforward. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on compensating controls until an official fix is released.
Potential Impact
For European organizations, especially those operating data centers or critical infrastructure managed via Schneider Electric's EcoStruxure IT Data Center Expert, this vulnerability poses a significant risk. Successful exploitation could allow attackers with privileged access to execute arbitrary commands remotely, potentially leading to unauthorized control over data center management systems. This could disrupt operations, compromise sensitive data, or facilitate further lateral movement within the network. Given the critical role of data center management in sectors such as finance, healthcare, manufacturing, and energy, the impact could extend to service outages, data breaches, and regulatory non-compliance under GDPR. The requirement for privileged access and console-level interaction somewhat limits the attack surface but does not eliminate risk, as insider threats or compromised administrative accounts could be leveraged. Additionally, the high impact on confidentiality, integrity, and availability underscores the potential for severe operational and reputational damage.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict and monitor privileged access to the EcoStruxure IT Data Center Expert consoles, ensuring only authorized personnel can access the server console. 2) Enforce strict input validation and sanitization policies at the application layer, if possible, to mitigate injection risks until a patch is available. 3) Employ network segmentation and access controls to limit console access to secure management networks, reducing exposure. 4) Implement robust logging and real-time monitoring of console access and hostname changes to detect suspicious activities promptly. 5) Conduct regular audits of privileged accounts and enforce multi-factor authentication to reduce the risk of credential compromise. 6) Stay in close contact with Schneider Electric for timely patch releases and apply updates immediately upon availability. 7) Consider deploying application-layer firewalls or intrusion prevention systems capable of detecting anomalous command injection attempts targeting the hostname input.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- schneider
- Date Reserved
- 2025-06-12T13:53:23.603Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6870e465a83201eaacadfdf7
Added to database: 7/11/2025, 10:16:05 AM
Last enriched: 7/11/2025, 10:31:09 AM
Last updated: 7/11/2025, 12:01:06 PM
Views: 2
Related Threats
CVE-2025-6788: CWE-668 Exposure of Resource to Wrong Sphere in Schneider Electric EcoStruxure Power Monitoring Expert (PME)
MediumCVE-2025-50125: CWE-918 Server-Side Request Forgery (SSRF) in Schneider Electric EcoStruxure IT Data Center Expert
MediumCVE-2025-50124: CWE-269 Improper Privilege Management in Schneider Electric EcoStruxure IT Data Center Expert
HighPatch, track, repeat
MediumCVE-2025-3933: CWE-1333 Inefficient Regular Expression Complexity in huggingface huggingface/transformers
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.