Insecure Default Credentials Vulnerability in Schneider Electric Products
CVE-2025-1960
Key Information:
- Vendor
- Schneider Electric
- Vendor
- CVE Published:
- 12 March 2025
What is CVE-2025-1960?
CVE-2025-1960 identifies a security flaw in products manufactured by Schneider Electric, which primarily serve to manage and optimize power distribution and automation in industrial environments. This vulnerability stems from the use of insecure default credentials that remain unchanged on first use, which can allow an attacker to execute unauthorized commands. The issue is exacerbated by a user interface design flaw that obscures the default username, increasing the likelihood that organizations will overlook this critical security measure.
Technical Details
The vulnerability falls under the Common Weakness Enumeration category CWE-1188, which relates to the initialization of resources using insecure default settings. Specifically, when Schneider Electric's products are deployed without modifying the factory-set default credentials, they become susceptible to unauthorized access and manipulation. An attacker exploiting this flaw could potentially take complete control of the affected system, leading to serious security breaches.
Potential impact of CVE-2025-1960
-
Unauthorized Access: Attackers can easily compromise systems that have not changed their default credentials, gaining the ability to execute unauthorized commands and manipulate system settings.
-
Operational Disruption: The exploitation of this vulnerability could lead to severe disruptions in industrial operations, which can have cascading effects on production and service delivery.
-
Data Exfiltration: Attackers may gain access to sensitive operational data, leading to potential data breaches that can involve intellectual property, personal information, or other critical business assets.
Affected Version(s)
WebHMI – Deployed with EcoStruxure Power Automation System WebHMI v4.1.0.0 and prior when deployed with EPAS User Interface 2.6.30.19 and prior
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved