Advisory Details

March 16th, 2026

Schneider Electric EcoStruxure Data Center Expert Hard-coded Password Remote Code Execution Vulnerability

ZDI-26-212
ZDI-CAN-28034

CVE ID CVE-2025-13957
CVSS SCORE 8.8, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Schneider Electric
AFFECTED PRODUCTS EcoStruxure Data Center Expert
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric EcoStruxure Data Center Expert. Authentication is required to exploit this vulnerability.

The specific flaw exists within the postgres service, which listens on TCP port 5432 by default. The issue results from the use of hard-coded credentials. An attacker can leverage this vulnerability to execute code in the context of the service account.

ADDITIONAL DETAILS Schneider Electric has issued an update to correct this vulnerability. More details can be found at:
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-069-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2026-069-05.pdf
DISCLOSURE TIMELINE
  • 2026-02-02 - Vulnerability reported to vendor
  • 2026-03-16 - Coordinated public release of advisory
  • 2026-03-16 - Advisory Updated
CREDIT hassan ali
BACK TO ADVISORIES