| CVE ID | CVE-2025-11565, CVE-2025-11566, CVE-2025-11567 |
| CVSS SCORE | 6.7, AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| AFFECTED VENDORS |
Schneider Electric |
| AFFECTED PRODUCTS |
PowerChute Serial Shutdown |
| VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of Schneider Electric PowerChute Serial Shutdown. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Additionally, the attacker must authenticate to the application. The specific flaw exists within the web service, which listens on TCP port 6547 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. |
| ADDITIONAL DETAILS |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-315-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-315-01.pdf |
| DISCLOSURE TIMELINE |
|
| CREDIT | Aleksandar Djurdjevic (https://github.com/revengsmK) |