Vulnerability in Schneider Electric EcoStruxure IT Software
Basically, there's a security flaw in Schneider Electric's software that could let hackers access sensitive information.
Schneider Electric has revealed a serious vulnerability in its EcoStruxure IT Data Center Expert software. This flaw could allow hackers to access sensitive information. Users must act quickly to apply the necessary patches or mitigations to secure their systems.
The Flaw
Schneider Electric has identified a hard-coded credentials vulnerability in its EcoStruxure IT Data Center Expert (DCE) software. This vulnerability is particularly concerning as it requires administrator credentials and the activation of a feature known as SOCKS Proxy, which is disabled by default. If exploited, this flaw could lead to information disclosure and even remote code execution.
The affected versions include EcoStruxure IT Data Center Expert version 9.0 and earlier. The vulnerability, cataloged as CVE-2025-13957, has been assigned a CVSS score of 7.2, indicating a high severity level. This means that organizations using these versions are at significant risk if they do not take immediate action.
What's at Risk
Organizations across various sectors, including commercial facilities, energy, and government services, are at risk due to this vulnerability. The EcoStruxure IT Data Center Expert software is widely used for monitoring critical infrastructure, making it a prime target for attackers. If the vulnerability is exploited, it could disrupt operations and allow unauthorized access to sensitive system data.
Failure to address this issue could lead to severe operational disruptions, potentially impacting not just the affected organizations but also the broader industries they serve. The global reach of Schneider Electric means that this vulnerability could have far-reaching consequences.
Patch Status
Schneider Electric has released a fix for this vulnerability in version 9.1 of the EcoStruxure IT Data Center Expert software. Users are strongly encouraged to upgrade to this version to mitigate the risks associated with the hard-coded credentials. For those unable to update immediately, the company recommends implementing specific mitigations to reduce exposure.
These mitigations include hardening the DCE instance according to cybersecurity best practices and ensuring that the SOCKS Proxy feature remains disabled. Detailed guidance can be found in the EcoStruxure IT Data Center Expert Security Handbook.
Immediate Actions
Organizations using the affected versions of EcoStruxure IT Data Center Expert should take immediate action. First, upgrade to version 9.1 to patch the vulnerability. If upgrading is not feasible, apply the recommended mitigations to minimize risk. This includes isolating control systems behind firewalls and ensuring that no unauthorized personnel can access critical infrastructure.
Additionally, organizations should regularly review their cybersecurity practices and conduct risk assessments to identify potential vulnerabilities. By taking these proactive measures, organizations can better protect themselves against potential exploits stemming from this vulnerability.
CISA Advisories