Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8448: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Schneider Eelctric EcoStruxure Building Operation Enterprise Server

0
Low
VulnerabilityCVE-2025-8448cvecve-2025-8448cwe-200
Published: Wed Aug 20 2025 (08/20/2025, 13:58:53 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Eelctric
Product: EcoStruxure Building Operation Enterprise Server

Description

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists that could cause unauthorized access to sensitive credential data when an attacker is able to capture local SMB traffic between a valid user within the BMS network and the vulnerable products.

AI-Powered Analysis

AILast updated: 09/09/2025, 21:17:47 UTC

Technical Analysis

CVE-2025-8448 is a vulnerability classified under CWE-200, indicating the exposure of sensitive information to unauthorized actors. It affects Schneider Electric's EcoStruxure Building Operation Enterprise Server across all versions 5.x, 6.x, and 7.x. The vulnerability arises when an attacker is able to capture local SMB (Server Message Block) traffic between a legitimate user within the Building Management System (BMS) network and the vulnerable EcoStruxure server. This captured traffic may contain sensitive credential data, which could be exposed due to insufficient protection or encryption of SMB communications. The vulnerability requires the attacker to have network access to the local BMS network segment and to be able to intercept SMB traffic, which is typically used for file sharing and communication between devices in Windows-based environments. The CVSS v3.1 score is 1.0, indicating a low severity level, with attack vector being adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:L), and partial user interaction (UI:P). The vulnerability does not impact confidentiality, integrity, or availability significantly beyond the exposure of credential data, and no known exploits are currently reported in the wild. No patches or remediation links have been published at this time.

Potential Impact

For European organizations, particularly those operating critical infrastructure or large commercial buildings managed via Schneider Electric's EcoStruxure Building Operation Enterprise Server, this vulnerability could lead to unauthorized disclosure of credential information within the BMS network. While the direct impact is limited due to the low severity and the requirement for local network access, exposure of credentials could facilitate further lateral movement or privilege escalation within the network if combined with other vulnerabilities or misconfigurations. This could potentially compromise building automation systems controlling HVAC, lighting, security, and other operational technology (OT) components, leading to operational disruptions or safety risks. The impact is mitigated by the high attack complexity and the need for user interaction, but organizations with less segmented or poorly secured BMS networks may face higher risks. Given the critical role of building management systems in energy efficiency and safety, even limited credential exposure warrants attention.

Mitigation Recommendations

European organizations should implement network segmentation to isolate BMS networks from general IT networks and restrict SMB traffic to only trusted devices. Deploying SMB encryption (SMB 3.x with encryption enabled) or using VPN tunnels for remote access can protect SMB traffic from interception. Monitoring network traffic for unusual SMB activity and employing intrusion detection systems tailored for OT environments can help detect potential reconnaissance or exploitation attempts. Regularly auditing user privileges and enforcing the principle of least privilege within the BMS network reduces the impact of credential exposure. Since no patches are currently available, organizations should engage with Schneider Electric for updates and consider compensating controls such as enhanced logging and anomaly detection. User training to minimize risky interactions and ensuring secure authentication mechanisms (e.g., multifactor authentication) for BMS access further reduce exploitation likelihood.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-07-31T21:02:43.599Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a5d90cad5a09ad00052e48

Added to database: 8/20/2025, 2:17:48 PM

Last enriched: 9/9/2025, 9:17:47 PM

Last updated: 10/6/2025, 5:52:54 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats