Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50123: CWE-94 Improper Control of Generation of Code ('Code Injection') in Schneider Electric EcoStruxure™ IT Data Center Expert

0
High
VulnerabilityCVE-2025-50123cvecve-2025-50123cwe-94
Published: Fri Jul 11 2025 (07/11/2025, 10:08:36 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EcoStruxure™ IT Data Center Expert

Description

A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause remote command execution by a privileged account when the server is accessed via a console and through exploitation of the hostname input.

AI-Powered Analysis

AILast updated: 11/11/2025, 06:25:00 UTC

Technical Analysis

CVE-2025-50123 is a vulnerability classified under CWE-94, indicating improper control over code generation, specifically code injection. It affects Schneider Electric's EcoStruxure™ IT Data Center Expert version 8.3. The flaw arises from insufficient validation or sanitization of the hostname input when accessed via the server console, allowing a privileged user to inject malicious code. This leads to remote command execution on the server, potentially compromising the entire system. The attack vector is partially network-based (AV:P), requiring low attack complexity (AC:L), privileged authentication (PR:H), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H). The scope is limited (SI:L), and security requirements for attack success are high (SA:H). No public exploits or patches are currently available, but the risk is significant given the critical role of the product in managing data center infrastructure. The vulnerability could allow attackers to execute arbitrary commands, manipulate system configurations, disrupt operations, or exfiltrate sensitive data. The vulnerability's presence in a widely used data center management platform increases its potential impact on organizations relying on Schneider Electric's solutions for operational continuity and security.

Potential Impact

For European organizations, the impact of CVE-2025-50123 is substantial, especially those operating critical data centers or industrial environments managed by Schneider Electric's EcoStruxure IT Data Center Expert. Successful exploitation could lead to unauthorized remote command execution, enabling attackers to disrupt data center operations, manipulate infrastructure controls, or access sensitive operational data. This could result in downtime, data breaches, or cascading failures affecting dependent services. Given the privileged access requirement, insider threats or compromised privileged accounts pose a significant risk vector. The high confidentiality, integrity, and availability impact could affect sectors such as finance, healthcare, energy, and manufacturing, where data center reliability and security are paramount. The lack of current patches increases exposure, necessitating immediate risk management. Additionally, disruption in critical infrastructure could have broader economic and societal consequences within Europe.

Mitigation Recommendations

1. Restrict access to the EcoStruxure IT Data Center Expert console strictly to trusted, authenticated privileged users and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Implement network segmentation and firewall rules to limit console access to secure management networks only. 3. Monitor and log all console access and hostname input activities for unusual or unauthorized commands or patterns indicative of code injection attempts. 4. Apply strict input validation and sanitization controls on hostname inputs at the application level, if possible, through configuration or vendor guidance. 5. Maintain up-to-date backups and incident response plans tailored to data center management systems. 6. Engage with Schneider Electric for timely updates or patches and subscribe to their security advisories. 7. Conduct regular security assessments and penetration testing focusing on privileged access paths and input validation controls. 8. Educate privileged users on the risks of code injection and secure operational practices to reduce insider threat risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-06-12T13:53:23.603Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6870e465a83201eaacadfdf7

Added to database: 7/11/2025, 10:16:05 AM

Last enriched: 11/11/2025, 6:25:00 AM

Last updated: 11/23/2025, 9:47:15 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats