Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8449: CWE-400 Uncontrolled Resource Consumption in Schnieder Electric EcoStruxure Building Operation Enterprise Server

0
Medium
VulnerabilityCVE-2025-8449cvecve-2025-8449cwe-400
Published: Wed Aug 20 2025 (08/20/2025, 13:55:34 UTC)
Source: CVE Database V5
Vendor/Project: Schnieder Electric
Product: EcoStruxure Building Operation Enterprise Server

Description

CWE-400: Uncontrolled Resource Consumption vulnerability exists that could cause a denial of service when an authenticated user sends a specially crafted request to a specific endpoint from within the BMS network.

AI-Powered Analysis

AILast updated: 09/09/2025, 21:18:04 UTC

Technical Analysis

CVE-2025-8449 is a medium-severity vulnerability classified under CWE-400, which pertains to uncontrolled resource consumption. This vulnerability affects Schneider Electric's EcoStruxure Building Operation Enterprise Server, specifically all versions in the 5.x and 7.x series. The flaw arises when an authenticated user within the Building Management System (BMS) network sends a specially crafted request to a particular endpoint on the server. This crafted request triggers excessive consumption of system resources, potentially leading to a denial of service (DoS) condition. The vulnerability requires the attacker to have low-level privileges (limited privileges) and network access within the BMS environment, with no user interaction needed beyond sending the malicious request. The CVSS 4.1 score reflects a medium impact, with attack vector being adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:L), and partial user interaction (UI:P). The vulnerability does not impact confidentiality, integrity, or availability beyond the DoS effect, which is limited to resource exhaustion causing service disruption. No known exploits are reported in the wild, and no patches have been published at the time of this analysis. The vulnerability is significant because EcoStruxure Building Operation Enterprise Server is a critical component in managing building automation systems, including HVAC, lighting, and security controls, making availability crucial for operational continuity.

Potential Impact

For European organizations, the impact of CVE-2025-8449 could be substantial in sectors relying heavily on building automation and management systems, such as commercial real estate, healthcare, education, and government facilities. A successful exploitation could disrupt building operations by causing denial of service on the Enterprise Server, potentially leading to loss of control over environmental systems, security monitoring, and energy management. This disruption could result in operational downtime, reduced occupant comfort and safety, and increased operational costs. Additionally, organizations with compliance obligations related to building safety and operational continuity may face regulatory scrutiny if such disruptions occur. Given the requirement for authenticated access within the BMS network, the threat is more likely to arise from insider threats or compromised internal accounts rather than external attackers, emphasizing the need for robust internal security controls.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Restrict and monitor access to the EcoStruxure Building Operation Enterprise Server, ensuring that only authorized personnel have authenticated access within the BMS network. 2) Employ network segmentation to isolate the BMS network from general corporate and internet-facing networks, reducing the attack surface. 3) Implement strict access control policies and multi-factor authentication for all users with access to the BMS environment to prevent unauthorized use of credentials. 4) Monitor network traffic and server logs for unusual or malformed requests targeting the specific endpoint to detect potential exploitation attempts early. 5) Coordinate with Schneider Electric for timely updates and patches once available, and plan for rapid deployment of security updates. 6) Conduct regular security audits and penetration testing focused on the BMS environment to identify and remediate potential weaknesses. 7) Develop and test incident response plans specific to building management system disruptions to minimize operational impact in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-07-31T21:02:44.262Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a5d58ead5a09ad000521fd

Added to database: 8/20/2025, 2:02:54 PM

Last enriched: 9/9/2025, 9:18:04 PM

Last updated: 10/6/2025, 7:59:12 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats