CVE-2025-0327

7.8 HIGH

📋 TL;DR

This CVE describes an Improper Privilege Management vulnerability in two Schneider Electric services where an attacker with standard user privileges can modify the executable path of Windows services. When services are restarted, this allows privilege escalation leading to loss of confidentiality, integrity, and availability of engineering workstations. Affected systems are Schneider Electric engineering workstations running vulnerable versions of the specified services.

💻 Affected Systems

Products:
  • Schneider Electric engineering workstation services (audit trail management and client request server)
Versions: Specific versions not provided in CVE description; refer to vendor advisory
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires standard user privileges and service restart to exploit. Both services must be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full control of engineering workstation, potentially compromising industrial control systems, manipulating audit trails, and disrupting operations.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive engineering data and potential manipulation of client-server communications.

🟢

If Mitigated

Limited impact with proper service hardening, least privilege principles, and monitoring in place.

🌐 Internet-Facing: LOW - Exploitation requires local access to the workstation.
🏢 Internal Only: HIGH - Standard users on affected engineering workstations can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires standard user privileges and ability to restart services. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Schneider Electric advisory SEVD-2025-042-03

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-042-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-03.pdf

Restart Required: No

Instructions:

1. Download and review Schneider Electric advisory SEVD-2025-042-03. 2. Apply vendor-provided patches or updates. 3. Verify service configurations post-patch.

🔧 Temporary Workarounds

Service Hardening

Windows

Restrict service executable path modifications through Windows permissions and service hardening

icacls "C:\Path\To\Services" /deny Users:(WD,AD)

Least Privilege Implementation

Windows

Remove standard users' ability to restart critical services

sc sdset ServiceName D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)

🧯 If You Can't Patch

  • Implement strict access controls to prevent standard users from modifying service configurations
  • Monitor service executable paths and service restarts for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check service configurations: sc qc ServiceName and verify executable paths are not writable by standard users

Check Version:

Check with Schneider Electric management tools or refer to vendor documentation

Verify Fix Applied:

Verify patch installation via vendor-specific version checks and confirm service permissions are properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Service Control Manager events (7036, 7040, 7045) showing service path modifications
  • Security logs: Privilege use events for service configuration changes

Network Indicators:

  • Unusual service restarts or connections from engineering workstations

SIEM Query:

EventID=7045 OR EventID=7040 | where ServiceName contains "Schneider" OR TargetUserName contains privileged accounts

🔗 References

📤 Share & Export