Schneider Electric Data Center Expert

Plan PatchCVSS 7.2ICS-CERT ICSA-25-016-08Oct 8, 2024
Schneider ElectricEnergy
Attack path
Attack VectorNetwork
Auth RequiredHigh
ComplexityLow
User InteractionNone needed
Summary

Schneider Electric Data Center Expert versions 8.1.1.3 and earlier contain a vulnerability that could allow an attacker with high-level account privileges to access private data managed by the monitoring software. The product collects and organizes critical equipment information across data center infrastructure. The vulnerability stems from improper authentication or authorization handling (CWE-347, CWE-306) and requires administrative-level credentials to exploit.

What this means
What could happen
An attacker with high-level account access could access sensitive data stored in Data Center Expert, potentially exposing equipment information, configurations, or other operational details critical to your data center or facility operations.
Who's at risk
Data center facility managers and IT operations teams who rely on Schneider Electric Data Center Expert for equipment monitoring and management, particularly those in the energy sector or critical infrastructure facilities where detailed equipment and operational data must remain confidential.
How it could be exploited
An attacker with administrative or highly privileged credentials can exploit this vulnerability to access private data stored or managed by Data Center Expert. The attack requires high-level account privileges and network access to the monitoring software.
Prerequisites
  • High-privilege account credentials (administrative level or equivalent)
  • Network access to Data Center Expert web interface or management port
  • Knowledge of valid user accounts with elevated permissions
High-privilege account requiredInformation disclosureSensitive data exposureNo active public exploitation reported
Exploitability
Unlikely to be exploited — EPSS score 0.2%
Affected products (1)
ProductAffected VersionsFix Status
Data Center Expert≤ 8.1.1.38.2
Remediation & Mitigation
0/6
Do now
0/1
WORKAROUNDDelete any existing 'logcapture' archives from the system via the https://server_ip/capturelogs web page and disable creation of new logcapture archives
Schedule — requires maintenance window
0/5

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Data Center Expert to version 8.2 or later
HARDENINGImplement least privilege access controls: audit all Data Center Expert user accounts and remove unnecessary administrative privileges, ensuring each user has only the minimum access required for their role
HARDENINGRestrict network access to Data Center Expert: place the system behind a firewall and isolate it from the business network; allow connections only from authorized IT management workstations
HARDENINGIf remote access to Data Center Expert is required, enforce VPN-only connectivity and disable direct internet-facing access
HARDENINGVerify SHA1 checksums of all Data Center Expert upgrade bundles before applying updates, as described in the Security Handbook
API: /api/v1/advisories/8936cd3e-aa8a-4744-8892-557c6707ecf5

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.