cnvd-2025-20057
Vulnerability from cnvd
Title
Schneider Electric EcoStruxure IT Data Center Expert服务器端请求伪造漏洞
Description
Schneider Electric EcoStruxure IT Data Center Expert是法国施耐德电气(Schneider Electric)公司的一款可扩展的监控软件,用于收集、组织和分发关键设备信息,提供设备的全面视图。 Schneider Electric EcoStruxure IT Data Center Expert存在服务器端请求伪造漏洞,攻击者可利用该漏洞从受影响服务器的角度访问或操纵资源。
Severity
Patch Name
Schneider Electric EcoStruxure IT Data Center Expert服务器端请求伪造漏洞的补丁
Patch Description
Schneider Electric EcoStruxure IT Data Center Expert是法国施耐德电气(Schneider Electric)公司的一款可扩展的监控软件,用于收集、组织和分发关键设备信息,提供设备的全面视图。 Schneider Electric EcoStruxure IT Data Center Expert存在服务器端请求伪造漏洞,攻击者可利用该漏洞从受影响服务器的角度访问或操纵资源。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://www.apc.com/us/en/product-range/61851-ecostruxure-it-data-center-expert/#products

Reference
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-189-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-189-01.pdf
Impacted products
Name
Schneider Electric EcoStruxure IT Data Center Expert <=8.3
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2025-50125",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-50125"
    }
  },
  "description": "Schneider Electric EcoStruxure IT Data Center Expert\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u53ef\u6269\u5c55\u7684\u76d1\u63a7\u8f6f\u4ef6\uff0c\u7528\u4e8e\u6536\u96c6\u3001\u7ec4\u7ec7\u548c\u5206\u53d1\u5173\u952e\u8bbe\u5907\u4fe1\u606f\uff0c\u63d0\u4f9b\u8bbe\u5907\u7684\u5168\u9762\u89c6\u56fe\u3002\n\nSchneider Electric EcoStruxure IT Data Center Expert\u5b58\u5728\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4ece\u53d7\u5f71\u54cd\u670d\u52a1\u5668\u7684\u89d2\u5ea6\u8bbf\u95ee\u6216\u64cd\u7eb5\u8d44\u6e90\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a \r\nhttps://www.apc.com/us/en/product-range/61851-ecostruxure-it-data-center-expert/#products",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2025-20057",
  "openTime": "2025-09-02",
  "patchDescription": "Schneider Electric EcoStruxure IT Data Center Expert\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u53ef\u6269\u5c55\u7684\u76d1\u63a7\u8f6f\u4ef6\uff0c\u7528\u4e8e\u6536\u96c6\u3001\u7ec4\u7ec7\u548c\u5206\u53d1\u5173\u952e\u8bbe\u5907\u4fe1\u606f\uff0c\u63d0\u4f9b\u8bbe\u5907\u7684\u5168\u9762\u89c6\u56fe\u3002\r\n\r\nSchneider Electric EcoStruxure IT Data Center Expert\u5b58\u5728\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4ece\u53d7\u5f71\u54cd\u670d\u52a1\u5668\u7684\u89d2\u5ea6\u8bbf\u95ee\u6216\u64cd\u7eb5\u8d44\u6e90\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Schneider Electric EcoStruxure IT Data Center Expert\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Schneider Electric EcoStruxure IT Data Center Expert \u003c=8.3"
  },
  "referenceLink": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-189-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2025-189-01.pdf",
  "serverity": "\u4e2d",
  "submitTime": "2025-07-25",
  "title": "Schneider Electric EcoStruxure IT Data Center Expert\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…