CVE-2025-0813

6.8 MEDIUM

📋 TL;DR

This CVE describes an authentication bypass vulnerability in Schneider Electric EPAS-UI software where an attacker with physical access can reboot the workstation and interrupt the boot process to gain unauthorized access. This affects systems running vulnerable versions of EPAS-UI where physical security controls are insufficient. The vulnerability allows bypassing authentication mechanisms without valid credentials.

💻 Affected Systems

Products:
  • Schneider Electric EPAS-UI
Versions: All versions prior to the fix
Operating Systems: Windows-based industrial control systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where EPAS-UI is installed and physical access to the workstation is possible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized user gains full administrative access to the EPAS-UI system, potentially allowing manipulation of industrial control systems, data theft, or disruption of operations.

🟠

Likely Case

Local attacker gains unauthorized access to the EPAS-UI interface, potentially viewing sensitive industrial control data or making unauthorized configuration changes.

🟢

If Mitigated

With proper physical security controls, the impact is minimal as attackers cannot gain physical access to the workstation.

🌐 Internet-Facing: LOW - This vulnerability requires physical access to the workstation and cannot be exploited remotely.
🏢 Internal Only: HIGH - Physical access to the workstation is required, making this primarily an internal risk where physical security is weak.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access and basic technical knowledge to interrupt boot process.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Schneider Electric advisory for specific patched versions

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-070-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-070-02.pdf

Restart Required: Yes

Instructions:

1. Download the patch from Schneider Electric's security advisory. 2. Apply the patch following vendor instructions. 3. Restart the EPAS-UI workstation. 4. Verify the fix is applied successfully.

🔧 Temporary Workarounds

Physical Security Controls

all

Implement strict physical access controls to prevent unauthorized personnel from accessing EPAS-UI workstations

BIOS/UEFI Password Protection

windows

Set BIOS/UEFI passwords to prevent boot process interruption

🧯 If You Can't Patch

  • Implement strict physical security controls including locked server rooms, access logs, and surveillance
  • Disable boot from removable media in BIOS/UEFI settings and set boot passwords

🔍 How to Verify

Check if Vulnerable:

Check if EPAS-UI is installed and if physical access to the workstation is possible without authentication bypass protections

Check Version:

Check EPAS-UI version through the application interface or consult system documentation

Verify Fix Applied:

Verify patch installation through EPAS-UI version check and attempt to reproduce the boot interruption scenario

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed boot attempts
  • Unexpected system reboots
  • Login attempts from unusual physical locations

Network Indicators:

  • Unusual access patterns to EPAS-UI systems

SIEM Query:

source="EPAS-UI" AND (event_type="boot_failure" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export