Skip to main content

CVE-2025-50123: CWE-94 Improper Control of Generation of Code ('Code Injection') in Schneider Electric EcoStruxure IT Data Center Expert

High
VulnerabilityCVE-2025-50123cvecve-2025-50123cwe-94
Published: Fri Jul 11 2025 (07/11/2025, 10:08:36 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EcoStruxure IT Data Center Expert

Description

CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause remote command execution by a privileged account when the server is accessed via a console and through exploitation of the hostname input.

AI-Powered Analysis

AILast updated: 07/11/2025, 10:31:09 UTC

Technical Analysis

CVE-2025-50123 is a high-severity vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects Schneider Electric's EcoStruxure IT Data Center Expert product, specifically versions 8.3 and prior. The flaw arises from insufficient validation or sanitization of the hostname input when accessed via the server console. A privileged account accessing the server console can exploit this vulnerability by injecting malicious code through the hostname field, leading to remote command execution on the affected system. The CVSS 4.0 score of 7.2 reflects a high severity, indicating that the vulnerability requires a privileged user (PR:H) and physical or local access (AV:P) to the server console, but does not require user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), meaning successful exploitation could lead to full system compromise. The scope is limited (SI:L) to the affected component, and the attack complexity is low (AC:L), suggesting that once the attacker has the required privileges and access, exploitation is straightforward. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on compensating controls until an official fix is released.

Potential Impact

For European organizations, especially those operating data centers or critical infrastructure managed via Schneider Electric's EcoStruxure IT Data Center Expert, this vulnerability poses a significant risk. Successful exploitation could allow attackers with privileged access to execute arbitrary commands remotely, potentially leading to unauthorized control over data center management systems. This could disrupt operations, compromise sensitive data, or facilitate further lateral movement within the network. Given the critical role of data center management in sectors such as finance, healthcare, manufacturing, and energy, the impact could extend to service outages, data breaches, and regulatory non-compliance under GDPR. The requirement for privileged access and console-level interaction somewhat limits the attack surface but does not eliminate risk, as insider threats or compromised administrative accounts could be leveraged. Additionally, the high impact on confidentiality, integrity, and availability underscores the potential for severe operational and reputational damage.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict and monitor privileged access to the EcoStruxure IT Data Center Expert consoles, ensuring only authorized personnel can access the server console. 2) Enforce strict input validation and sanitization policies at the application layer, if possible, to mitigate injection risks until a patch is available. 3) Employ network segmentation and access controls to limit console access to secure management networks, reducing exposure. 4) Implement robust logging and real-time monitoring of console access and hostname changes to detect suspicious activities promptly. 5) Conduct regular audits of privileged accounts and enforce multi-factor authentication to reduce the risk of credential compromise. 6) Stay in close contact with Schneider Electric for timely patch releases and apply updates immediately upon availability. 7) Consider deploying application-layer firewalls or intrusion prevention systems capable of detecting anomalous command injection attempts targeting the hostname input.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-06-12T13:53:23.603Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6870e465a83201eaacadfdf7

Added to database: 7/11/2025, 10:16:05 AM

Last enriched: 7/11/2025, 10:31:09 AM

Last updated: 7/11/2025, 12:01:06 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats