Schneider Electric EcoStruxure Power Design
EcoStruxure Power Design - Ecodial contains a deserialization flaw that allows arbitrary code execution when a malicious project file is opened. The vulnerability affects all versions of the Ecodial NL, INT, and FR variants. An attacker could craft a malicious project file that, when opened by an engineer on the workstation, executes arbitrary code with user privileges. Schneider Electric is developing a fix for future versions but has not yet released a patch. Until remediation is available, Schneider recommends integrity checking of project files using hash verification, restricting file sources to trusted parties, and implementing network and physical access controls to isolate the engineering environment.
- Local access to the engineering workstation running EcoStruxure Power Design
- User must open a malicious project file
- No special privileges or credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c7142a11-0450-4dde-a38e-5d2de8ac95d4