ICSA-21-063-02_Schneider Electric EcoStruxure Building Operation (EBO)
Schneider Electric EcoStruxure Building Operation versions 2.0 through 3.1 contain multiple vulnerabilities: improper file upload validation (CWE-434) allows uploading malicious files, cross-site scripting (CWE-79) enables code injection through web forms, XML external entity (XXE) attack vectors (CWE-611) exist in XML processing, and insufficient access controls (CWE-284) permit unauthorized actions. These flaws affect WebStation, Enterprise Server installer, WebReports, and Enterprise Central installer components. An authenticated attacker could upload files, inject malicious scripts, or manipulate system data to compromise building control operations.
- Valid EBO user account credentials
- Network access to WebStation, Enterprise Server, or WebReports web interface (typically port 80 or 443)
- User interaction required (user must click or interact with injected content)
- Knowledge of EBO application functionality
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8482dabf-d0b7-44c7-b24e-669e0502246bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.