Schneider Electric EcoStruxure Power Monitoring Expert (PME) (Update B)
Schneider Electric EcoStruxure Power Monitoring Expert (PME) is vulnerable to unsafe deserialization of untrusted data (CWE-502), which could lead to Remote Code Execution. The vulnerability occurs when PME processes uploaded serialized files without proper validation. Affected versions include PME 2022 and all prior versions (2021 and earlier). PME 2022 versions can be patched via Hotfix_75031_PME2022. PME 2021 and earlier versions have reached end-of-life support; Schneider Electric recommends upgrading to the latest PME version to resolve this issue.
- Valid EcoStruxure Power Monitoring Expert (PME) user account credentials
- Network access to the PME application interface (HTTP/HTTPS)
- Ability to upload files to PME
- High attack complexity requirement—attacker must craft a specific serialized payload
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c2a2eb45-f1bd-4cc5-9c46-2d17ae129c49Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.