CVE-2024-11425

7.5 HIGH

📋 TL;DR

An unauthenticated attacker can send a specially crafted HTTPS packet to the webserver, causing a buffer size calculation error that leads to a denial-of-service condition. This affects Schneider Electric products with vulnerable web server components exposed to network traffic.

💻 Affected Systems

Products:
  • Specific Schneider Electric products listed in SEVD-2025-014-01
Versions: Versions specified in the Schneider Electric security advisory
Operating Systems: Embedded systems running Schneider Electric firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the web server component enabled and accessible via HTTPS

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of the affected Schneider Electric product, potentially impacting industrial operations or building management systems.

🟠

Likely Case

Temporary service outage requiring manual restart of the affected device or service.

🟢

If Mitigated

No impact if the vulnerability is patched or if network controls prevent access to the web server.

🌐 Internet-Facing: HIGH - The vulnerability requires only network access and no authentication, making internet-exposed systems particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable to attacks from compromised internal hosts or malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires crafting specific HTTPS packets but no authentication needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions specified in SEVD-2025-014-01

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-014-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-014-01.pdf

Restart Required: Yes

Instructions:

1. Download the firmware update from Schneider Electric's website. 2. Follow the vendor's specific update procedures for your affected product. 3. Verify the update was successful by checking the firmware version.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to the web server interface using firewall rules or network segmentation

Disable Web Server

all

If web interface functionality is not required, disable the web server component

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the web server interface
  • Monitor for unusual HTTPS traffic patterns or repeated connection attempts to the web server

🔍 How to Verify

Check if Vulnerable:

Check if your Schneider Electric product model and firmware version match those listed in SEVD-2025-014-01

Check Version:

Check via the product's web interface or management console for firmware version information

Verify Fix Applied:

Verify the firmware version after patching matches the fixed version in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTPS request patterns
  • Web server crash or restart logs
  • Failed connection attempts with malformed packets

Network Indicators:

  • Abnormal HTTPS traffic to the web server port
  • Repeated connection attempts from single sources

SIEM Query:

source_ip sends https_request to device_ip AND (request_size > threshold OR pattern matches known exploit)

🔗 References

📤 Share & Export