Schneider Electric EcoStruxure Power Monitoring Expert
Schneider Electric has released advisories for multiple vulnerabilities in EcoStruxure Power Monitoring Expert (PME), Power Operation (EPO), and Power SCADA Operation (PSO) software. The vulnerabilities include unsafe deserialization of untrusted data (CWE-502), server-side request forgery (CWE-918), and path traversal (CWE-22). These flaws could allow an authenticated attacker to execute arbitrary code, access sensitive operational data, or bypass authorization controls. The vulnerabilities affect PME versions 2022, 2023, 2023_R2, 2024, and 2024_R2. Hotfix_279338_Release_2024R2 addresses the flaws in PME 2024 R2; older versions require different patches. Some deployments run PME in a Managed Service model, which may increase exposure if not properly isolated.
- Valid user credentials for EcoStruxure Power Monitoring Expert
- Network access to the PME application server (typically internal network but may be Internet-facing if in Managed Service deployment)
- One of the affected product versions (PME 2022, 2023, 2023_R2, 2024, or 2024_R2)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5af99202-19fb-40a2-b95f-1609a8aa5238Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.