Schneider Electric Rack PDU (Update A)
A privilege escalation vulnerability exists in Schneider Electric Rack PDUs that could allow an authenticated attacker with low privileges to gain elevated access. The vulnerability affects AP7xxxx and AP8xxx models with NMC2 (firmware v6.9.6 and prior), AP7xxx and AP8xxx with NMC3 (firmware v1.1.0.3 and prior), and APDU9xxx with NMC3 (firmware v1.0.0.28 and prior). Successful exploitation requires valid user credentials, network access to the management interface, and user interaction through the outlet links feature. The vulnerability has been addressed through firmware updates.
- Valid user account credentials (non-administrative)
- Network access to the Rack PDU management port (80/443)
- Ability to interact with the web interface
- Outlet links feature must be enabled
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3e899684-bc83-4b12-bcbb-77fb1ee14fa0Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.