CVE-2025-8453
BaseFortify
Publication date: 2025-08-20
Last updated on: 2025-08-20
Assigner: Schneider Electric SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| schneider_electric | saitel_dp_rtu | 11.06.34 |
| schneider_electric | saitel_dr_rtu | 11.06.29 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper privilege management issue (CWE-269) that allows a privileged engineer user with console access to escalate their privileges and execute arbitrary code. It occurs when this user modifies a configuration file used by a root-level daemon to execute custom scripts, potentially leading to unauthorized actions at the root level.
How can this vulnerability impact me? :
The vulnerability can lead to privilege escalation and arbitrary code execution, allowing an attacker with initial privileged engineer access to gain root-level control. This can result in unauthorized system modifications, data breaches, service disruptions, and compromise of the entire system's security.