CVE-2025-11567

N/A Unknown

📋 TL;DR

This CVE describes an Incorrect Default Permissions vulnerability in Schneider Electric software where installation folders have insecure default permissions. This allows local attackers to gain elevated system access by modifying files in the installation directory. Organizations using affected Schneider Electric products are at risk.

💻 Affected Systems

Products:
  • Specific Schneider Electric products not listed in provided reference
Versions: Not specified in provided reference
Operating Systems: Windows-based systems (implied by folder permissions vulnerability)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when installation folder permissions are not properly secured. Requires local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing attackers to install malware, steal credentials, or pivot to other systems.

🟠

Likely Case

Local privilege escalation enabling attackers to gain higher privileges than intended, potentially leading to data theft or system manipulation.

🟢

If Mitigated

Minimal impact with proper folder permissions and access controls in place, limiting the attack surface.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. Attackers can modify files in the installation directory to execute arbitrary code with elevated privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided reference

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-315-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-315-01.pdf

Restart Required: Yes

Instructions:

1. Download and apply the security update from Schneider Electric. 2. Restart affected systems. 3. Verify installation folder permissions are properly secured.

🔧 Temporary Workarounds

Secure Installation Folder Permissions

windows

Manually adjust folder permissions to restrict write access to authorized users only.

icacls "C:\Program Files\Schneider Electric\[Product]" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F" /grant:r "Users:(OI)(CI)RX"

Restrict User Access

all

Limit user accounts that have write access to the installation directory.

🧯 If You Can't Patch

  • Implement strict access controls on installation folders, removing write permissions for non-administrative users.
  • Monitor file system changes in installation directories using security tools or audit logs.

🔍 How to Verify

Check if Vulnerable:

Check folder permissions on Schneider Electric installation directories. If non-administrative users have write permissions, the system is vulnerable.

Check Version:

Check product documentation or vendor advisory for version-specific information.

Verify Fix Applied:

Verify that installation folder permissions only allow write access to administrators and SYSTEM accounts. Confirm security update is installed.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file modifications in Schneider Electric installation directories
  • Failed permission change attempts on system folders

Network Indicators:

  • Local privilege escalation typically doesn't generate network traffic

SIEM Query:

EventID=4663 AND ObjectName LIKE '%Schneider Electric%' AND Accesses LIKE '%Write%'

🔗 References

📤 Share & Export