CVE-2025-11566

N/A Unknown

📋 TL;DR

This vulnerability allows attackers on the local network to brute-force authentication on the /REST/shutdownnow endpoint, potentially gaining unauthorized access to user accounts. It affects Schneider Electric systems with exposed REST APIs. Attackers can perform unlimited authentication attempts without rate limiting.

💻 Affected Systems

Products:
  • Schneider Electric systems with /REST/shutdownnow endpoint
Versions: Specific versions not provided in CVE description
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration; requires local network access to exploit

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via unauthorized administrative access leading to data theft, system shutdown, or ransomware deployment.

🟠

Likely Case

Unauthorized access to user accounts allowing data exfiltration, configuration changes, or service disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and authentication controls preventing brute-force attempts.

🌐 Internet-Facing: LOW (requires local network access per description)
🏢 Internal Only: HIGH (exploitable from internal networks with no authentication attempt restrictions)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access and ability to send HTTP requests to the endpoint; brute-forcing is straightforward

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-315-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-315-01.pdf

Restart Required: Yes

Instructions:

1. Review vendor advisory SEVD-2025-315-01 2. Download and apply recommended patches 3. Restart affected systems 4. Verify patch application

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to the /REST/shutdownnow endpoint using firewall rules

iptables -A INPUT -p tcp --dport [PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [PORT] -j DROP

Authentication Rate Limiting

all

Implement rate limiting on authentication attempts using web application firewall or proxy

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from untrusted networks
  • Deploy web application firewall with brute-force protection rules for the /REST/shutdownnow endpoint

🔍 How to Verify

Check if Vulnerable:

Test if you can send multiple authentication requests to /REST/shutdownnow endpoint without being blocked

Check Version:

Check system documentation or vendor portal for version information

Verify Fix Applied:

Verify authentication attempts are now rate-limited or blocked after excessive failures

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts from single IP
  • Unusual access patterns to /REST/shutdownnow

Network Indicators:

  • High volume of POST requests to /REST/shutdownnow endpoint
  • Authentication brute-force patterns

SIEM Query:

source="web_logs" AND uri="/REST/shutdownnow" AND status=401 | stats count by src_ip | where count > 10

🔗 References

📤 Share & Export