CVE-2025-2875

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to manipulate a controller's webserver URL to access resources they shouldn't have access to, potentially exposing sensitive information. It affects Schneider Electric products with vulnerable web interfaces. Attackers can exploit this without credentials to breach confidentiality.

💻 Affected Systems

Products:
  • Schneider Electric controllers with vulnerable web interfaces
Versions: Specific versions not detailed in CVE; refer to vendor advisory
Operating Systems: Embedded/controller OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web interfaces on Schneider Electric controllers; exact product list in vendor advisory

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of confidentiality with exposure of all web-accessible resources including configuration files, credentials, and sensitive operational data.

🟠

Likely Case

Unauthorized access to some web resources, potentially exposing configuration details or limited sensitive information.

🟢

If Mitigated

Minimal impact if proper network segmentation and access controls prevent external access to the vulnerable interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves URL manipulation which is typically straightforward

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to vendor advisory for specific fixed versions

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-133-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-133-01.pdf

Restart Required: Yes

Instructions:

1. Review vendor advisory for affected products. 2. Download and apply the recommended firmware update. 3. Restart the controller to apply changes. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate vulnerable controllers from untrusted networks

Access Control Lists

all

Implement firewall rules to restrict access to controller web interface

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable controllers
  • Deploy web application firewall (WAF) rules to block URL manipulation attempts

🔍 How to Verify

Check if Vulnerable:

Check if Schneider Electric controller web interface is accessible and test for URL path traversal/manipulation

Check Version:

Check web interface status page or use vendor-specific CLI commands

Verify Fix Applied:

Verify firmware version matches vendor's fixed version and test that URL manipulation no longer works

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns in web server logs
  • Access attempts to restricted paths

Network Indicators:

  • HTTP requests with manipulated URLs to controller IPs
  • Unusual traffic patterns to controller web ports

SIEM Query:

source_ip="*" AND dest_ip="controller_ip" AND (url="*../*" OR url="*/..*" OR url_pattern="*unusual_path*")

🔗 References

📤 Share & Export