Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2273: CWE-94 Improper Control of Generation of Code ('Code Injection') in Schneider Electric EcoStruxure™ Automation Expert

0
High
VulnerabilityCVE-2026-2273cvecve-2026-2273cwe-94
Published: Tue Mar 10 2026 (03/10/2026, 17:18:39 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EcoStruxure™ Automation Expert

Description

CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exist that could cause execution of untrusted commands on the engineering workstation which could result in a limited compromise of the workstation and a potential loss of Confidentiality, Integrity and Availability of the subsequent system when an authenticated user opens a malicious project file.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:04:58 UTC

Technical Analysis

CVE-2026-2273 is a vulnerability classified under CWE-94, indicating improper control over code generation that leads to code injection. This flaw exists in Schneider Electric's EcoStruxure™ Automation Expert software versions prior to 25.0.1. The vulnerability allows an authenticated user with low privileges to execute arbitrary commands on the engineering workstation by opening a specially crafted malicious project file. The attack vector requires user interaction (opening the file) but does not require elevated privileges or authentication beyond standard user access. The vulnerability can result in a limited compromise of the engineering workstation, potentially cascading to affect the confidentiality, integrity, and availability of the broader industrial control system managed by the software. The CVSS 4.0 base score is 7.2 (high), reflecting the local attack vector, low attack complexity, no need for authentication beyond low privileges, and significant impact on system components. Although no known exploits are currently reported in the wild, the nature of the vulnerability makes it a critical concern for industrial environments where EcoStruxure™ Automation Expert is deployed. The vulnerability highlights the risk of executing untrusted code embedded in project files, emphasizing the need for secure file handling and validation mechanisms within industrial automation software.

Potential Impact

The vulnerability could allow attackers to execute arbitrary code on engineering workstations, which are critical components in industrial automation environments. This can lead to unauthorized access, manipulation, or disruption of control systems, potentially causing operational downtime, safety hazards, or data breaches. The compromise of confidentiality could expose sensitive operational data, while integrity violations might result in unauthorized changes to control logic or configurations, leading to unsafe or inefficient system behavior. Availability impacts could disrupt industrial processes, causing financial losses and safety risks. Given the integration of EcoStruxure™ Automation Expert in critical infrastructure and manufacturing sectors worldwide, exploitation could have cascading effects on supply chains and industrial operations. The requirement for user interaction and authentication limits the ease of exploitation but does not eliminate the risk, especially in environments where users may inadvertently open malicious files. Organizations relying on this software face risks of targeted attacks, insider threats, or accidental compromise through social engineering.

Mitigation Recommendations

1. Immediately upgrade EcoStruxure™ Automation Expert to version 25.0.1 or later where the vulnerability is patched. 2. Implement strict access controls to limit user privileges on engineering workstations, ensuring users operate with the least privilege necessary. 3. Enforce rigorous validation and scanning of project files before opening, including the use of endpoint security solutions capable of detecting malicious code injection attempts. 4. Educate users on the risks of opening untrusted project files and establish policies to verify file sources. 5. Employ network segmentation to isolate engineering workstations from broader corporate and operational networks, reducing potential lateral movement. 6. Monitor engineering workstations for unusual activity or command execution patterns indicative of exploitation attempts. 7. Maintain up-to-date backups of critical project files and configurations to enable recovery in case of compromise. 8. Consider application whitelisting or sandboxing techniques to restrict execution of unauthorized code on engineering workstations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
schneider
Date Reserved
2026-02-10T09:45:08.807Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b05632ea502d3aa87d6b6b

Added to database: 3/10/2026, 5:34:42 PM

Last enriched: 3/10/2026, 6:04:58 PM

Last updated: 3/14/2026, 2:29:20 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses