CVE-2023-25547

8.8 HIGH

📋 TL;DR

This vulnerability allows low-privileged users to upload and install packages, potentially leading to remote code execution on affected StruxureWare Data Center Expert systems. Attackers with basic user accounts can exploit improper authorization checks to gain elevated privileges and execute arbitrary code. Organizations running vulnerable versions of this data center management software are at risk.

💻 Affected Systems

Products:
  • StruxureWare Data Center Expert
Versions: V7.9.2 and prior
Operating Systems: Windows-based systems running the software
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. The vulnerability exists in the authorization mechanism for package upload and installation functions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the data center management system, potentially pivoting to other systems in the infrastructure.

🟠

Likely Case

Unauthorized package installation leading to data center management system compromise, configuration changes, and potential data exfiltration.

🟢

If Mitigated

Limited impact with proper network segmentation and strict access controls preventing low-privileged users from reaching vulnerable interfaces.

🌐 Internet-Facing: HIGH if the management interface is exposed to the internet, as attackers can exploit this remotely.
🏢 Internal Only: HIGH due to the low privilege requirement and potential for insider threats or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires low-privileged user credentials. The vulnerability is in authorization logic, making exploitation straightforward once an attacker has basic access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version newer than V7.9.2

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf

Restart Required: Yes

Instructions:

1. Download the latest version from Schneider Electric's official portal
2. Backup current configuration and data
3. Install the update following vendor documentation
4. Restart the Data Center Expert service
5. Verify functionality post-update

🔧 Temporary Workarounds

Restrict User Privileges

all

Remove package upload and installation permissions from all low-privileged user accounts

Use Data Center Expert's user management interface to modify permissions

Network Segmentation

all

Isolate Data Center Expert management interface from general user networks

Configure firewall rules to restrict access to management interface IP/ports

🧯 If You Can't Patch

  • Implement strict access controls allowing only administrative users to access package management functions
  • Monitor for suspicious package upload or installation activities and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check the software version in Data Center Expert's About or System Information section

Check Version:

Check via the software's GUI interface or configuration files - specific command depends on installation

Verify Fix Applied:

Confirm version is newer than V7.9.2 and test that low-privileged users cannot upload/install packages

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized package upload attempts
  • Package installation by non-admin users
  • Failed authorization events for package operations

Network Indicators:

  • Unexpected traffic to package upload endpoints
  • Unusual outbound connections post-package installation

SIEM Query:

source="DataCenterExpert" AND (event_type="package_upload" OR event_type="package_install") AND user_role!="admin"

🔗 References

📤 Share & Export