Skip to main content

CVE-2025-6788: CWE-668 Exposure of Resource to Wrong Sphere in Schneider Electric EcoStruxure Power Monitoring Expert (PME)

Medium
VulnerabilityCVE-2025-6788cvecve-2025-6788cwe-668
Published: Fri Jul 11 2025 (07/11/2025, 11:09:35 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EcoStruxure Power Monitoring Expert (PME)

Description

CWE-668: Exposure of Resource to Wrong Sphere vulnerability exists that exposes TGML diagram resources to the wrong control sphere, providing other authenticated users with potentially inappropriate access to TGML diagrams.

AI-Powered Analysis

AILast updated: 07/11/2025, 11:46:06 UTC

Technical Analysis

CVE-2025-6788 is a medium-severity vulnerability classified under CWE-668 (Exposure of Resource to Wrong Sphere) affecting Schneider Electric's EcoStruxure Power Monitoring Expert (PME) versions 2023, 2023 R2, 2024, and 2024 R2. The vulnerability arises from improper access control mechanisms that allow authenticated users to access TGML (Trend Graphic Markup Language) diagram resources outside their authorized control sphere. Essentially, this means that users with legitimate credentials but limited privileges can view or interact with TGML diagrams that belong to other control spheres, which they should not have access to. TGML diagrams are critical components used in PME for visualizing power monitoring data and system states, and unauthorized access to these diagrams could lead to information disclosure or misuse of operational data. The CVSS 4.0 base score is 5.3, indicating a medium impact, with the vector showing network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), low impact on confidentiality (VC:L), and no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability does not require user interaction and can be exploited remotely by an authenticated user with low privileges, making it a concern for environments where multiple users have access to PME but should be segregated by control spheres.

Potential Impact

For European organizations, especially those in critical infrastructure sectors such as energy, utilities, and manufacturing that rely on Schneider Electric's EcoStruxure PME for power monitoring and management, this vulnerability could lead to unauthorized disclosure of sensitive operational diagrams. Exposure of TGML diagrams to unauthorized users can undermine operational security by revealing system configurations, power flow data, and control logic, potentially aiding adversaries in planning further attacks or causing operational disruptions. While the vulnerability does not directly allow modification or disruption of services, the leakage of control sphere boundaries and system visualization data can facilitate insider threats or lateral movement within the network. Given the strategic importance of power monitoring systems in Europe’s energy grid and industrial environments, this vulnerability could impact compliance with data protection and operational security regulations, and may increase the risk profile of affected organizations.

Mitigation Recommendations

1. Implement strict role-based access controls (RBAC) and ensure that user permissions are tightly scoped to their operational needs, minimizing cross-sphere access. 2. Monitor and audit user access logs specifically for TGML diagram access to detect any unauthorized or anomalous access patterns. 3. Apply network segmentation to isolate PME instances and restrict access to trusted users and systems only. 4. Engage with Schneider Electric to obtain and apply any forthcoming patches or updates addressing CVE-2025-6788 as soon as they become available. 5. Conduct regular security assessments and penetration tests focusing on access control mechanisms within PME deployments. 6. Educate users about the sensitivity of TGML diagrams and enforce policies that prevent sharing or exporting of these resources outside authorized spheres. 7. Consider deploying compensating controls such as data loss prevention (DLP) solutions to monitor and block unauthorized dissemination of diagram data.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-06-27T12:59:12.591Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6870f5fea83201eaacae7227

Added to database: 7/11/2025, 11:31:10 AM

Last enriched: 7/11/2025, 11:46:06 AM

Last updated: 7/11/2025, 11:46:06 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats