CNVD-2025-20057

Vulnerability from cnvd - Published: 2025-09-02
VLAI Severity ?
Title
Schneider Electric EcoStruxure IT Data Center Expert服务器端请求伪造漏洞
Description
Schneider Electric EcoStruxure IT Data Center Expert是法国施耐德电气(Schneider Electric)公司的一款可扩展的监控软件,用于收集、组织和分发关键设备信息,提供设备的全面视图。 Schneider Electric EcoStruxure IT Data Center Expert存在服务器端请求伪造漏洞,攻击者可利用该漏洞从受影响服务器的角度访问或操纵资源。
Severity
Patch Name
Schneider Electric EcoStruxure IT Data Center Expert服务器端请求伪造漏洞的补丁
Patch Description
Schneider Electric EcoStruxure IT Data Center Expert是法国施耐德电气(Schneider Electric)公司的一款可扩展的监控软件,用于收集、组织和分发关键设备信息,提供设备的全面视图。 Schneider Electric EcoStruxure IT Data Center Expert存在服务器端请求伪造漏洞,攻击者可利用该漏洞从受影响服务器的角度访问或操纵资源。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://www.apc.com/us/en/product-range/61851-ecostruxure-it-data-center-expert/#products

Reference
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-189-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-189-01.pdf
Impacted products
Name
Schneider Electric EcoStruxure IT Data Center Expert <=8.3
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2025-50125",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-50125"
    }
  },
  "description": "Schneider Electric EcoStruxure IT Data Center Expert\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u53ef\u6269\u5c55\u7684\u76d1\u63a7\u8f6f\u4ef6\uff0c\u7528\u4e8e\u6536\u96c6\u3001\u7ec4\u7ec7\u548c\u5206\u53d1\u5173\u952e\u8bbe\u5907\u4fe1\u606f\uff0c\u63d0\u4f9b\u8bbe\u5907\u7684\u5168\u9762\u89c6\u56fe\u3002\n\nSchneider Electric EcoStruxure IT Data Center Expert\u5b58\u5728\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4ece\u53d7\u5f71\u54cd\u670d\u52a1\u5668\u7684\u89d2\u5ea6\u8bbf\u95ee\u6216\u64cd\u7eb5\u8d44\u6e90\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a \r\nhttps://www.apc.com/us/en/product-range/61851-ecostruxure-it-data-center-expert/#products",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2025-20057",
  "openTime": "2025-09-02",
  "patchDescription": "Schneider Electric EcoStruxure IT Data Center Expert\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u53ef\u6269\u5c55\u7684\u76d1\u63a7\u8f6f\u4ef6\uff0c\u7528\u4e8e\u6536\u96c6\u3001\u7ec4\u7ec7\u548c\u5206\u53d1\u5173\u952e\u8bbe\u5907\u4fe1\u606f\uff0c\u63d0\u4f9b\u8bbe\u5907\u7684\u5168\u9762\u89c6\u56fe\u3002\r\n\r\nSchneider Electric EcoStruxure IT Data Center Expert\u5b58\u5728\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4ece\u53d7\u5f71\u54cd\u670d\u52a1\u5668\u7684\u89d2\u5ea6\u8bbf\u95ee\u6216\u64cd\u7eb5\u8d44\u6e90\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Schneider Electric EcoStruxure IT Data Center Expert\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Schneider Electric EcoStruxure IT Data Center Expert \u003c=8.3"
  },
  "referenceLink": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-189-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2025-189-01.pdf",
  "serverity": "\u4e2d",
  "submitTime": "2025-07-25",
  "title": "Schneider Electric EcoStruxure IT Data Center Expert\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…