CVE-2025-11565

N/A Unknown

📋 TL;DR

A path traversal vulnerability in Schneider Electric systems allows local network Web Admin users to manipulate file paths via POST /REST/UpdateJRE requests, potentially gaining elevated system access. This affects Schneider Electric products with vulnerable web interfaces accessible to authenticated local users.

💻 Affected Systems

Products:
  • Schneider Electric products with vulnerable web admin interfaces
Versions: Specific versions not detailed in advisory; check vendor documentation
Operating Systems: Embedded/industrial OS running Schneider Electric software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Web Admin user access on local network; not exploitable from internet without internal access

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, allowing installation of malicious software, data theft, or disruption of industrial control systems.

🟠

Likely Case

Unauthorized file access or modification, potentially leading to service disruption or credential harvesting from the affected system.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent local attackers from reaching the vulnerable endpoint.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated Web Admin access and knowledge of vulnerable endpoint

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-315-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-315-01.pdf

Restart Required: Yes

Instructions:

1. Download patch from Schneider Electric portal. 2. Apply according to vendor instructions. 3. Restart affected systems. 4. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems from general network access

Access Control Restriction

all

Limit Web Admin access to trusted users only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Enforce least privilege access controls for Web Admin users

🔍 How to Verify

Check if Vulnerable:

Check if system responds to POST /REST/UpdateJRE requests and validate path traversal protections

Check Version:

Check system web interface or vendor-specific version command

Verify Fix Applied:

Verify patch version installed and test that path traversal attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /REST/UpdateJRE
  • File access attempts outside expected directories

Network Indicators:

  • POST requests to /REST/UpdateJRE with suspicious path parameters

SIEM Query:

web_access_logs WHERE uri_path CONTAINS '/REST/UpdateJRE' AND (request_body CONTAINS '../' OR request_body CONTAINS '..\\')

🔗 References

📤 Share & Export