CVE-2025-0813
📋 TL;DR
This CVE describes an authentication bypass vulnerability in Schneider Electric EPAS-UI software where an attacker with physical access can reboot the workstation and interrupt the boot process to gain unauthorized access. This affects systems running vulnerable versions of EPAS-UI where physical security controls are insufficient. The vulnerability allows bypassing authentication mechanisms without valid credentials.
💻 Affected Systems
- Schneider Electric EPAS-UI
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Unauthorized user gains full administrative access to the EPAS-UI system, potentially allowing manipulation of industrial control systems, data theft, or disruption of operations.
Likely Case
Local attacker gains unauthorized access to the EPAS-UI interface, potentially viewing sensitive industrial control data or making unauthorized configuration changes.
If Mitigated
With proper physical security controls, the impact is minimal as attackers cannot gain physical access to the workstation.
🎯 Exploit Status
Exploitation requires physical access and basic technical knowledge to interrupt boot process.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Schneider Electric advisory for specific patched versions
Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-070-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-070-02.pdf
Restart Required: Yes
Instructions:
1. Download the patch from Schneider Electric's security advisory. 2. Apply the patch following vendor instructions. 3. Restart the EPAS-UI workstation. 4. Verify the fix is applied successfully.
🔧 Temporary Workarounds
Physical Security Controls
allImplement strict physical access controls to prevent unauthorized personnel from accessing EPAS-UI workstations
BIOS/UEFI Password Protection
windowsSet BIOS/UEFI passwords to prevent boot process interruption
🧯 If You Can't Patch
- Implement strict physical security controls including locked server rooms, access logs, and surveillance
- Disable boot from removable media in BIOS/UEFI settings and set boot passwords
🔍 How to Verify
Check if Vulnerable:
Check if EPAS-UI is installed and if physical access to the workstation is possible without authentication bypass protections
Check Version:
Check EPAS-UI version through the application interface or consult system documentation
Verify Fix Applied:
Verify patch installation through EPAS-UI version check and attempt to reproduce the boot interruption scenario
📡 Detection & Monitoring
Log Indicators:
- Multiple failed boot attempts
- Unexpected system reboots
- Login attempts from unusual physical locations
Network Indicators:
- Unusual access patterns to EPAS-UI systems
SIEM Query:
source="EPAS-UI" AND (event_type="boot_failure" OR event_type="unauthorized_access")