CVE-2025-1960

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute unauthorized commands on Schneider Electric systems when default credentials remain unchanged after installation. The WebHMI interface incorrectly displays the default username, making it harder for administrators to identify and change insecure defaults. Organizations using affected Schneider Electric products with unchanged default passwords are at risk.

💻 Affected Systems

Products:
  • Schneider Electric WebHMI products (specific models not detailed in provided reference)
Versions: All versions prior to patched version (exact range not specified in provided reference)
Operating Systems: Embedded systems running Schneider Electric WebHMI
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable if default credentials were not changed after installation. The WebHMI interface displays the default username incorrectly, complicating identification of the insecure default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands, disrupt industrial operations, steal sensitive data, or pivot to other network systems.

🟠

Likely Case

Unauthorized access to the WebHMI interface leading to configuration changes, data exfiltration, or disruption of monitoring/control functions.

🟢

If Mitigated

Minimal impact if default credentials were changed during initial setup and proper network segmentation is in place.

🌐 Internet-Facing: HIGH - Internet-exposed systems with unchanged defaults are trivially exploitable via credential guessing.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this, but requires network access to the vulnerable system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of default credentials and network access to the WebHMI interface. The vulnerability is simple to exploit once the target is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided reference - check vendor advisory for exact version

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-070-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-070-03.pdf

Restart Required: Yes

Instructions:

1. Download the security patch from Schneider Electric's website. 2. Apply the patch according to vendor instructions. 3. Restart the system as required. 4. Verify the fix by checking that default credentials no longer work.

🔧 Temporary Workarounds

Change Default Credentials

all

Immediately change all default passwords and usernames on affected systems

Use WebHMI interface to change administrator credentials

Network Segmentation

all

Isolate WebHMI systems from untrusted networks and implement firewall rules

Configure firewall to restrict access to WebHMI ports (typically HTTP/HTTPS)

🧯 If You Can't Patch

  • Immediately change all default credentials to strong, unique passwords
  • Implement network segmentation and firewall rules to restrict access to WebHMI interfaces

🔍 How to Verify

Check if Vulnerable:

Attempt to log into WebHMI interface using default credentials. Check if default username/password combinations still work.

Check Version:

Check WebHMI interface system information page or consult vendor documentation

Verify Fix Applied:

Verify that default credentials no longer provide access. Confirm system is running patched version.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login
  • Login events using default usernames
  • Configuration changes from unexpected sources

Network Indicators:

  • Unauthorized access to WebHMI ports
  • Traffic patterns indicating credential guessing

SIEM Query:

source="webhmi" AND (event_type="login" AND (username="default" OR username="admin")) OR (event_type="config_change" AND user="default")

🔗 References

📤 Share & Export