Resource Exposure in Schneider Electric's TGML Diagrams
CVE-2025-6788

5.3MEDIUM

What is CVE-2025-6788?

A vulnerability exists in Schneider Electric's TGML diagrams that may allow authenticated users to gain inappropriate access to sensitive TGML diagram resources. This exposure occurs when resources are incorrectly managed within the control sphere, potentially leading to unauthorized visibility of critical information. Organizations utilizing these diagrams should review their security configurations and access controls to mitigate the risk of unintended data exposure.

Affected Version(s)

EcoStruxure™ Power Monitoring Expert 2023

EcoStruxure™ Power Monitoring Expert 2023 R2

EcoStruxure™ Power Monitoring Expert 2024

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-6788 : Resource Exposure in Schneider Electric's TGML Diagrams