CVE-2025-6625

7.5 HIGH

📋 TL;DR

An improper input validation vulnerability in Schneider Electric devices allows attackers to cause denial of service by sending specially crafted FTP commands. This affects systems running vulnerable Schneider Electric software with FTP services enabled. Attackers can disrupt device functionality without authentication.

💻 Affected Systems

Products:
  • Schneider Electric devices with vulnerable FTP implementation
Versions: Specific versions not detailed in advisory; refer to vendor documentation
Operating Systems: Embedded/industrial control systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires FTP service to be enabled and accessible. Industrial control systems and SCADA devices are primarily affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device unavailability requiring physical reset or maintenance intervention to restore functionality.

🟠

Likely Case

Temporary service disruption affecting FTP functionality and potentially related services on the device.

🟢

If Mitigated

No impact if FTP service is disabled or network access is properly restricted.

🌐 Internet-Facing: HIGH - FTP services exposed to internet are directly vulnerable to unauthenticated attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to disrupt critical infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted FTP commands to vulnerable service. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Schneider Electric security advisory SEVD-2025-224-05

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-224-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-224-05.pdf

Restart Required: Yes

Instructions:

1. Review Schneider Electric advisory SEVD-2025-224-05. 2. Identify affected products and versions. 3. Apply vendor-provided patches or firmware updates. 4. Restart affected devices as required. 5. Verify service restoration.

🔧 Temporary Workarounds

Disable FTP Service

all

Completely disable FTP service if not required for operations

Device-specific configuration commands vary by product

Network Segmentation

all

Restrict network access to FTP service using firewalls or ACLs

iptables -A INPUT -p tcp --dport 21 -j DROP
netsh advfirewall firewall add rule name="Block FTP" dir=in action=block protocol=TCP localport=21

🧯 If You Can't Patch

  • Implement strict network access controls to limit FTP service exposure
  • Monitor FTP service logs for unusual activity and implement rate limiting

🔍 How to Verify

Check if Vulnerable:

Check if device runs affected Schneider Electric software with FTP service enabled and accessible

Check Version:

Device-specific commands; consult product documentation for version checking

Verify Fix Applied:

Verify patch installation via device management interface and test FTP service functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual FTP command patterns
  • Multiple failed FTP connections
  • FTP service crash logs

Network Indicators:

  • Unusual FTP traffic patterns
  • FTP commands with malformed parameters
  • Port 21 scanning activity

SIEM Query:

source="ftp.log" AND (command="*crafted*" OR command="*malformed*" OR status="crash")

🔗 References

📤 Share & Export