Schneider Electric’s Shocking Security Slip: Privilege Escalation Alert!

Attention IT experts! Schneider Electric’s EcoStruxure IT Data Center Expert is experiencing a privilege escalation issue. The Charon executable can help attackers channel their inner hacker, granting them unauthorized root access. Time to patch up and prevent your data center from becoming a cyber playground!

Pro Dashboard

Hot Take:

Oh Schneider Electric, you had one job: keep those pesky hackers out of the data center! But alas, it seems your EcoStruxure IT Data Center Expert has turned into an ‘EcoStruxure IT Data Center Amateur’. Low-privileged users can now waltz their way to becoming the king of the root castle, thanks to the Charon executable. Maybe it’s time to hire a new gatekeeper, eh?

Key Points:

  • Schneider Electric’s EcoStruxure IT Data Center Expert version 8.3 and prior are affected by a privilege escalation vulnerability.
  • The Charon executable allows low-privileged users to obtain root privileges by manipulating service start and stop commands.
  • The vulnerability is identified under CVE-2025-50124 and is classified as CWE-266: Incorrect Privilege Assignment.
  • A patch is available in version 9.0, accessible through Schneider Electric’s Customer Care Center.
  • This vulnerability was discovered by KoreLogic’s dynamic duo, Jaggar Henry and Jim Becher.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?