Schneider Electric PowerChute Serial Shutdown
Schneider Electric PowerChute Serial Shutdown versions 1.3 and earlier contain three vulnerabilities related to improper file permissions, weak authentication, and insufficient access controls. These flaws allow a local attacker with user-level credentials to escalate privileges, bypass authentication, or modify system files. Exploitation could disrupt the graceful shutdown process for servers and workstations during power outages, preventing proper UPS-managed power-down sequences and risking data loss or equipment damage. The product is a UPS management utility used in data centers and critical infrastructure environments to enable coordinated system shutdown and energy management during power events.
- Local user account on the system where PowerChute is installed
- PowerChute Serial Shutdown version 1.3 or earlier
- Ability to write to PowerChute installation directory or custom folders with insufficient permissions
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4a3deb37-3dbb-4111-8ce2-6b32d53f7673Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.