Vulnerability in Schneider Electric EcoStruxure Automation Expert
Basically, there's a security flaw in Schneider Electric's software that could let hackers take control.
Schneider Electric has revealed a vulnerability in its EcoStruxure Automation Expert software. This flaw could allow unauthorized command execution, risking critical systems. Users must update to the latest version to secure their operations.
The Flaw
Schneider Electric has identified a serious vulnerability in its EcoStruxure™ Automation Expert software, specifically versions prior to v25.0.1. This flaw, classified under CVE-2026-2273, is a Code Injection vulnerability. It allows an authenticated user to execute arbitrary commands on the engineering workstation when they open a malicious project file. This could lead to a limited compromise of the workstation and potentially affect the overall system's Confidentiality, Integrity, and Availability.
The CVSS score for this vulnerability is 8.2, indicating a high severity level. This means that the risk of exploitation is significant, especially in environments where this software is deployed. The EcoStruxure Automation Expert is widely used in critical infrastructure sectors such as energy and manufacturing, making this vulnerability particularly concerning.
What's at Risk
The vulnerability primarily affects users in sectors like Commercial Facilities, Critical Manufacturing, and Energy. It poses a risk to systems that rely on EcoStruxure for digital control in discrete, hybrid, and continuous industrial processes. If exploited, the flaw could allow an attacker to execute unauthorized commands, leading to potential operational disruptions or data breaches.
Organizations using this software should be aware that failure to address this vulnerability could lead to severe operational risks. This includes unauthorized access to sensitive data and the possibility of system downtime, which can be costly and damaging to reputation.
Patch Status
Schneider Electric has released a fix in version 25.0.1 of EcoStruxure Automation Expert. Users are strongly encouraged to upgrade to this version to mitigate the risk associated with the vulnerability. For those unable to immediately update, Schneider Electric has provided mitigation strategies to help reduce exposure.
These strategies include storing solution and archive files in secure locations and verifying file authenticity before opening. Detailed remediation steps can be found in the user manual linked in the advisory. Users should act swiftly to ensure their systems are protected against potential exploits.
Immediate Actions
To safeguard your systems, follow these recommended actions:
- Update to EcoStruxure Automation Expert version 25.0.1 as soon as possible.
- If unable to update, implement the provided mitigations, such as restricting file access and verifying file integrity.
- Regularly review and apply cybersecurity best practices, including using firewalls and isolating control systems from business networks.
Organizations should also conduct a thorough risk assessment and impact analysis to understand the implications of this vulnerability and ensure that all necessary precautions are taken to protect their critical infrastructure.
CISA Advisories