C-Bus Toolkit and C-Gate Server
Multiple vulnerabilities in Schneider Electric C-Bus Toolkit (versions before 1.15.10) and C-Gate Server (versions before 2.11.8) allow remote code execution. The vulnerabilities involve file path traversal (CWE-22), improper permissions (CWE-732), and authentication issues (CWE-287). Exploitation could allow an attacker with network access and valid credentials to execute arbitrary commands on the engineering workstation or server, potentially enabling unauthorized control of C-Bus building automation systems.
- Network access to C-Gate Server on its listening port (typically 20000)
- Valid C-Bus Toolkit or C-Gate Server user credentials
- C-Bus Toolkit version below 1.15.10 or C-Gate Server version below 2.11.8 running on the target system
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5cdb860e-744c-4a4b-8a2e-ee16b4c8e340Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.