Skip to main content

CVE-2025-7746: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Schneider Electric ATV630/650/660/680/6A0/6B0/6L0 Altivar Process Drives

Medium
VulnerabilityCVE-2025-7746cvecve-2025-7746cwe-79
Published: Tue Sep 09 2025 (09/09/2025, 21:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: ATV630/650/660/680/6A0/6B0/6L0 Altivar Process Drives

Description

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists that could cause an unvalidated data injected by a malicious user potentially leading to modify or read data in a victim’s browser.

AI-Powered Analysis

AILast updated: 09/09/2025, 21:17:30 UTC

Technical Analysis

CVE-2025-7746 is a Cross-site Scripting (XSS) vulnerability classified under CWE-79 affecting Schneider Electric's Altivar Process Drives series, specifically models ATV630, 650, 660, 680, 6A0, 6B0, and 6L0. This vulnerability arises from improper neutralization of input during web page generation, allowing an attacker to inject malicious scripts into web pages viewed by legitimate users. Since these drives include web-based management or monitoring interfaces, the vulnerability enables an unauthenticated attacker to craft malicious input that, when rendered by a victim's browser, could execute arbitrary JavaScript code. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required for exploitation, and limited impact confined to the victim's browser session. The vulnerability affects all versions of the product line and was published on September 9, 2025. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow attackers to read or modify data within the victim’s browser context, potentially leading to session hijacking, data theft, or manipulation of the web interface used to control or monitor the drives. Given the critical industrial role of these drives in process automation, exploitation could indirectly impact operational integrity if attackers manipulate control interfaces or gather sensitive operational data via the web interface.

Potential Impact

For European organizations, especially those in industrial sectors such as manufacturing, utilities, and process industries, this vulnerability poses a risk to operational technology (OT) environments. Schneider Electric Altivar drives are widely used in Europe for motor control and process automation. An attacker exploiting this XSS flaw could compromise the integrity of the web management interface, potentially leading to unauthorized access to operational data or manipulation of control parameters if combined with other vulnerabilities or social engineering. While the direct impact is limited to the browser session of users interacting with the web interface, the indirect consequences could include disruption of industrial processes, data leakage, or facilitation of further attacks within the OT network. The medium severity score reflects that while the vulnerability does not allow direct system takeover or denial of service, it can be a stepping stone for more complex attacks targeting critical infrastructure. European organizations with remote or web-accessible management interfaces for these drives are particularly at risk, especially if proper network segmentation and access controls are not enforced.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the web management interfaces of the affected Altivar drives to trusted internal networks only, using network segmentation and firewall rules to prevent exposure to untrusted networks or the internet. 2. Employ web application firewalls (WAFs) capable of detecting and blocking XSS payloads targeting these devices. 3. Educate users and administrators to avoid clicking on suspicious links or inputting untrusted data into the device interfaces. 4. Monitor network traffic and logs for unusual activity related to the drives’ web interfaces. 5. Since no patches are currently available, coordinate with Schneider Electric for timely updates and apply security patches as soon as they are released. 6. Implement Content Security Policy (CSP) headers if configurable on the devices to restrict the execution of unauthorized scripts. 7. Conduct regular security assessments of OT environments to identify and remediate web interface vulnerabilities. 8. Consider deploying endpoint protection on systems used to access these interfaces to detect malicious scripts or browser-based attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-07-17T09:10:51.541Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c096a79ed239a66bac6ae9

Added to database: 9/9/2025, 9:05:43 PM

Last enriched: 9/9/2025, 9:17:30 PM

Last updated: 9/10/2025, 12:01:35 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats