CVE-2026-1226
Improper Code Generation in TGML Processing Enables Code Execution
Publication date: 2026-02-11
Last updated on: 2026-02-11
Assigner: Schneider Electric SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| schneider_electric | ecostruxure_building_operation | to 7.0.2 (exc) |
| schneider_electric | ecostruxure_building_operation | to 6.0.4.7000 (exc) |
| schneider_electric | ecostruxure_building_operation | to 7.0.3.2000 (exc) |
| schneider_electric | ecostruxure_building_operation | to 6.0.4.14001 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2026-1226 is a vulnerability classified as CWE-94: Improper Control of Generation of Code. It exists in Schneider Electric's EcoStruxure Building Operation (EBO) software platforms. The vulnerability allows execution of untrusted or unintended code within the application when a maliciously crafted TGML graphics file is processed. This means that if an attacker can supply a specially designed TGML file, the system may run harmful code that was not intended by the application developers."}] [1]
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized code execution within the EBO system, which can compromise the confidentiality, integrity, and availability of the system. An attacker exploiting this flaw could potentially execute malicious code, causing data breaches, disruption of building management operations, or denial of service conditions. Since EBO manages building systems and devices to improve energy efficiency and performance, such an attack could impact building safety, operational continuity, and data security.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The provided resources do not include specific detection commands or methods to identify this vulnerability on your network or system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate CVE-2026-1226, immediate steps include upgrading the EcoStruxure Building Operation Workstation and WebStation software to version 7.0.2 or later for the 7.0.x series, or version 6.0.4.7000 (CP5) or later for the 6.0.x series.
If patches cannot be applied immediately, implement strong access controls limiting system access to authorized personnel, use multi-factor authentication for EBO version 7.0 or later, employ firewalls to segregate networks and protect the building management system, regularly monitor system activity, and follow EBO hardening guidelines.
- Upgrade to EcoStruxure Building Operation Workstation and WebStation version 7.0.2 or later (7.0.x series).
- Upgrade to version 6.0.4.7000 (CP5) or later (6.0.x series).
- Implement strong access controls limiting system access to authorized personnel.
- Use multi-factor authentication for EBO version 7.0 or later.
- Employ firewalls to segregate networks and protect the building management system.
- Regularly monitor system activity.
- Follow EBO hardening guidelines.