Multiple Vulnerabilities on PowerChute™ Serial Shutdown
Schneider Electric has identified multiple input validation vulnerabilities in PowerChute Serial Shutdown (version 1.4 and earlier). The vulnerabilities include improper input validation (CWE-22, CWE-116), weak authentication mechanisms (CWE-307), and related weaknesses that could allow an attacker with administrative privileges to disrupt graceful shutdown operations, alter system behavior, or access sensitive system data. PowerChute Serial Shutdown is a UPS management software used to automate safe system shutdown and energy management on desktops, servers, and workstations.
- Administrative or high-privilege credentials on the system running PowerChute Serial Shutdown
- Local or network access to the affected system
- PowerChute Serial Shutdown version 1.4 or earlier installed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2b2f9fd2-6b8d-4bc4-9543-e3d8ec2299eeGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.