CVE-2026-1226: CWE-94 Improper Control of Generation of Code ('Code Injection') in Schneider Electric EcoStruxure Building Operation Workstation
CVE-2026-1226 is a high-severity code injection vulnerability (CWE-94) in Schneider Electric's EcoStruxure Building Operation Workstation versions prior to 7. 0. 2. The flaw arises from improper control over code generation when processing maliciously crafted TGML graphics files, potentially allowing execution of untrusted code. Exploitation requires local access with low privileges and some user interaction, but no authentication is needed beyond local privileges. This vulnerability can severely impact confidentiality, integrity, and availability of building management systems. No known exploits are reported in the wild yet. European organizations using affected Schneider Electric building operation software should prioritize patching and implement strict file validation and access controls. Countries with high adoption of Schneider Electric products and critical infrastructure reliance, such as Germany, France, UK, and the Netherlands, are most at risk. The CVSS score of 7 reflects the significant risk posed by this vulnerability in operational technology environments.
AI Analysis
Technical Summary
CVE-2026-1226 is a vulnerability classified under CWE-94, indicating improper control of code generation, specifically a code injection flaw within Schneider Electric's EcoStruxure Building Operation Workstation software. This vulnerability exists in all 7.0.x versions prior to 7.0.2. The issue arises when the application processes TGML (a proprietary graphics markup language) files containing maliciously crafted design content. Due to insufficient validation or sanitization of these files, an attacker can inject and execute unintended or untrusted code within the context of the application. The vulnerability requires local access with low privileges (AV:L, PR:L) and some user interaction (UI:P), but does not require authentication (AT:N). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), indicating that successful exploitation could lead to full compromise of the workstation and potentially the building operation environment it manages. The vulnerability does not require network access (AV:L), limiting remote exploitation but still posing a significant risk in environments where local access can be obtained, such as through social engineering or insider threats. No known exploits have been reported in the wild, but the high CVSS score (7.0) and the critical nature of building management systems make this a serious concern. The vulnerability was published on February 11, 2026, and no official patches are linked yet, emphasizing the need for immediate attention from affected users.
Potential Impact
For European organizations, particularly those managing critical infrastructure and smart building environments, this vulnerability poses a substantial risk. Exploitation could allow attackers to execute arbitrary code on workstations controlling building operations, potentially leading to unauthorized control over HVAC, lighting, security systems, and other critical functions. This could result in operational disruptions, safety hazards, data breaches, and loss of system integrity. Given the reliance on Schneider Electric's EcoStruxure platform in many European commercial buildings, industrial facilities, and public infrastructure, the impact could extend to economic losses and reputational damage. The requirement for local access and user interaction somewhat limits the attack vector but does not eliminate the threat, especially in environments with multiple users or insufficient access controls. The high confidentiality, integrity, and availability impact ratings indicate that successful exploitation could compromise sensitive operational data and disrupt essential services.
Mitigation Recommendations
1. Immediately upgrade EcoStruxure Building Operation Workstation installations to version 7.0.2 or later once available to apply the official patch. 2. Until patches are applied, restrict local access to workstations running the affected software, enforcing strict physical and logical access controls. 3. Implement application whitelisting and endpoint protection to detect and block execution of unauthorized code. 4. Enforce strict validation and scanning of all TGML graphics files before processing, including sandboxing or quarantining untrusted files. 5. Conduct user awareness training to reduce the risk of social engineering attacks that could lead to local access or user interaction exploitation. 6. Monitor logs and system behavior for unusual activity indicative of code injection attempts. 7. Segment building operation networks from general IT networks to limit lateral movement in case of compromise. 8. Review and tighten user privileges on workstations to minimize the potential impact of low-privilege local exploits.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2026-1226: CWE-94 Improper Control of Generation of Code ('Code Injection') in Schneider Electric EcoStruxure Building Operation Workstation
Description
CVE-2026-1226 is a high-severity code injection vulnerability (CWE-94) in Schneider Electric's EcoStruxure Building Operation Workstation versions prior to 7. 0. 2. The flaw arises from improper control over code generation when processing maliciously crafted TGML graphics files, potentially allowing execution of untrusted code. Exploitation requires local access with low privileges and some user interaction, but no authentication is needed beyond local privileges. This vulnerability can severely impact confidentiality, integrity, and availability of building management systems. No known exploits are reported in the wild yet. European organizations using affected Schneider Electric building operation software should prioritize patching and implement strict file validation and access controls. Countries with high adoption of Schneider Electric products and critical infrastructure reliance, such as Germany, France, UK, and the Netherlands, are most at risk. The CVSS score of 7 reflects the significant risk posed by this vulnerability in operational technology environments.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1226 is a vulnerability classified under CWE-94, indicating improper control of code generation, specifically a code injection flaw within Schneider Electric's EcoStruxure Building Operation Workstation software. This vulnerability exists in all 7.0.x versions prior to 7.0.2. The issue arises when the application processes TGML (a proprietary graphics markup language) files containing maliciously crafted design content. Due to insufficient validation or sanitization of these files, an attacker can inject and execute unintended or untrusted code within the context of the application. The vulnerability requires local access with low privileges (AV:L, PR:L) and some user interaction (UI:P), but does not require authentication (AT:N). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), indicating that successful exploitation could lead to full compromise of the workstation and potentially the building operation environment it manages. The vulnerability does not require network access (AV:L), limiting remote exploitation but still posing a significant risk in environments where local access can be obtained, such as through social engineering or insider threats. No known exploits have been reported in the wild, but the high CVSS score (7.0) and the critical nature of building management systems make this a serious concern. The vulnerability was published on February 11, 2026, and no official patches are linked yet, emphasizing the need for immediate attention from affected users.
Potential Impact
For European organizations, particularly those managing critical infrastructure and smart building environments, this vulnerability poses a substantial risk. Exploitation could allow attackers to execute arbitrary code on workstations controlling building operations, potentially leading to unauthorized control over HVAC, lighting, security systems, and other critical functions. This could result in operational disruptions, safety hazards, data breaches, and loss of system integrity. Given the reliance on Schneider Electric's EcoStruxure platform in many European commercial buildings, industrial facilities, and public infrastructure, the impact could extend to economic losses and reputational damage. The requirement for local access and user interaction somewhat limits the attack vector but does not eliminate the threat, especially in environments with multiple users or insufficient access controls. The high confidentiality, integrity, and availability impact ratings indicate that successful exploitation could compromise sensitive operational data and disrupt essential services.
Mitigation Recommendations
1. Immediately upgrade EcoStruxure Building Operation Workstation installations to version 7.0.2 or later once available to apply the official patch. 2. Until patches are applied, restrict local access to workstations running the affected software, enforcing strict physical and logical access controls. 3. Implement application whitelisting and endpoint protection to detect and block execution of unauthorized code. 4. Enforce strict validation and scanning of all TGML graphics files before processing, including sandboxing or quarantining untrusted files. 5. Conduct user awareness training to reduce the risk of social engineering attacks that could lead to local access or user interaction exploitation. 6. Monitor logs and system behavior for unusual activity indicative of code injection attempts. 7. Segment building operation networks from general IT networks to limit lateral movement in case of compromise. 8. Review and tighten user privileges on workstations to minimize the potential impact of low-privilege local exploits.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- schneider
- Date Reserved
- 2026-01-20T12:38:21.548Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698c8bab4b57a58fa19a50d1
Added to database: 2/11/2026, 2:01:15 PM
Last enriched: 2/18/2026, 3:22:26 PM
Last updated: 3/28/2026, 10:06:04 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.