OTPulse

EcoStruxure™ Building Operation Enterprise Server, EcoStruxure™ Building Operation Enterprise Central, and EcoStruxure™ Workstation

Monitor4.5SEVD-2025-224-04Aug 12, 2025
Attack VectorAdjacent
Auth RequiredLow
ComplexityHigh
User InteractionRequired
Summary

Multiple vulnerabilities in EcoStruxure Building Operation Enterprise Server, Enterprise Central, and Workstation (versions 5.x, 6.x, and 7.x) could allow credential theft and unauthorized access. Successful exploitation could result in data breaches and operational disruptions to building systems. The vulnerabilities are related to improper resource handling (CWE-400) and information exposure (CWE-200).

What this means
What could happen
An attacker with network access and valid user credentials could steal login credentials and gain unauthorized access to the building management system, potentially allowing them to remotely change building operations, disable safety controls, or disrupt energy systems.
Who's at risk
Building automation and energy management operators responsible for EcoStruxure Building Operation platforms. This affects organizations running Building Operation Enterprise Server, Enterprise Central, or Workstation software versions 5.x, 6.x, or 7.x. Impacts are relevant to facility managers and IT staff at utilities, commercial buildings, hospitals, universities, and industrial facilities that rely on centralized building management systems for HVAC, lighting, energy control, and facility monitoring.
How it could be exploited
An attacker on the same network segment as the EcoStruxure system could intercept or extract stored credentials from the application. With stolen credentials, they could log in as a legitimate user and execute commands within the building management system to alter HVAC setpoints, disable alarms, or stop critical building operations.
Prerequisites
  • Network access to the EcoStruxure Building Operation system (same network segment or routable path)
  • Valid user credentials (obtained through credential theft vulnerability or intercepted during authentication)
Credential theft vulnerabilityCan lead to unauthorized remote accessRequires valid user credentials for exploitationNo active exploitation reportedAffects central building control systems
Exploitability
Low exploit probability (EPSS 0.0%)
Affected products (9)
9 with fix
ProductAffected VersionsFix Status
EcoStruxure™ Building Operation Enterprise Server All 7.x≥ 7.x|<7.0.2.3487.0.2.348
EcoStruxure™ Building Operation Enterprise Server All 6.x≥ 6.x|<6.0.4.10001 (CP8)7.0.2.348
EcoStruxure™ Building Operation Enterprise Server All 5.x≥ 5.x|<5.0.3.17009 (CP16)7.0.2.348
EcoStruxure™ Building Operation Enterprise Central All 7.x≥ 7.x|<7.0.2.3487.0.2.348
EcoStruxure™ Building Operation Enterprise Central All 6.x≥ 6.x|<6.0.4.10001 (CP8)7.0.2.348
EcoStruxure™ Building Operation Enterprise Central All 5.x≥ 5.x|<5.0.3.17009 (CP16)7.0.2.348
EcoStruxure™ Building Operation Workstation All 7.x≥ 7.x|<7.0.2.3487.0.2.348
EcoStruxure™ Building Operation Workstation All 6.x≥ 6.x|<6.0.4.10001 (CP8)7.0.2.348
Remediation & Mitigation
0/2
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpgrade EcoStruxure Building Operation Enterprise Server to version 7.0.2.348, 6.0.4.10001 (CP8), or 5.0.3.17009 (CP16) depending on your current major version
Long-term hardening
0/1
HARDENINGApply EBO hardening guidelines from Schneider Electric documentation to reduce attack surface and enforce strong authentication controls
↑↓ Navigate · Esc Close
API: /api/v1/advisories/3b92a818-484a-4dac-aa08-1dc789280230