TL;DR

A severe use-after-free vulnerability in Schneider Electric's software allows for potential RCE via malicious files or pages, rated CVSS 7.8.

What happened

['Schneider Electric EcoStruxure Power Build contains a use-after-free flaw.', 'Vulnerability allows remote code execution with user interaction required.']

Why it matters for ops

['Potential exploitation can lead to unauthorized access and control of systems.', 'User action is necessary for the vulnerability to be exploited, reducing immediate risk but not eliminating it entirely.']

Mitigation

  • Update to the latest version of EcoStruxure Power Build.
  • Implement strict user access controls and monitor for suspicious activities.

Action items

  • Apply available patches or updates immediately.
  • Review system configurations and update security policies accordingly.

Detection IOCs

  • CVE-2025-13845
  • Use-after-free condition in SSD file parsing

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-093/