CyberDanube Security Research 20250909-0 | Cross-Site Scripting in Schneider ATV 630
Schneider ATV 630设备存在反射型XSS漏洞(CVE-2025-7746),攻击者可利用ClientNonce参数注入脚本代码,劫持用户会话。目前无补丁可用,建议限制管理界面访问并进行全面安全审查。 2025-9-25 22:49:18 Author: seclists.org(查看原文) 阅读量:3 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Thomas Weber | CyberDanube via Fulldisclosure <fulldisclosure () seclists org>
Date: Tue, 23 Sep 2025 11:55:36 +0000

CyberDanube Security Research 20250909-0
-------------------------------------------------------------------------------
                title| Reflected XSS
              product| ATV 630
   vulnerable version| "see Vulnerable versions"
        fixed version| none
           CVE number| CVE-2025-7746
               impact| Medium
             homepage| https://www.se.com/
                found| 2025-03-11
                   by| T. Weber (Office Vienna)
                     | D. Blagojevic
                     | CyberDanube Security Research
                     | Vienna | St. Pölten
                     |
                     | https://www.cyberdanube.com
-------------------------------------------------------------------------------

Vendor description
-------------------------------------------------------------------------------
"Schneider’s purpose is to create Impact by empowering all to make the most of
our energy and resources, bridging progress and sustainability. At Schneider,
we call this Life Is On.
Our mission is to be the trusted partner in Sustainability and Efficiency.
[...]"

Source: https://www.se.com/ww/en/about-us/company-profile/


Vulnerable versions
-------------------------------------------------------------------------------
ATV630:
app     V3.4IE35
eth     V1.FIE26
cpld    V0.0IE16
pwr     V1.3IE08
mc      V3.4IE35
product v3.4IE35

See also the security notification from Schneider Electric:
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-252-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-252-01.pdf

Vulnerability overview
-------------------------------------------------------------------------------
1) Reflected Cross-Site Scripting (CVE-2025-7746)
A Reflected Cross-Site Scripting vulnerability was identified in the web
interface of the device. The ClientNonce parameter can be abused to inject
JavaScript code. An attacker can exploit this vulnerability by luring a victim
to visit a malicious website. Furthermore, it is possible to hijack the session
of the attacked user.


Proof of Concept
-------------------------------------------------------------------------------
1) Stored Cross-Site Scripting (CVE-2025-7746)
During the logon process a ClientNonce can be specified to trigger a cross-site
scripting vulnerability. The following response to the server contains script
code to demonstrate this problem:
-------------------------------------------------------------------------------
GET /<redacted-patch-is-missing> HTTP/1.1
Host: 172.21.241.60
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: */*
Accept-Language: de,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate, br
X-Requested-With: XMLHttpRequest
Origin: http://172.21.241.60
Connection: close
Referer: http://172.21.241.60/
Cookie: 20c7ac82=1
-------------------------------------------------------------------------------
The webserver of the device responds without filtering the payload. Therefore,
the script code gets executed:
-------------------------------------------------------------------------------
HTTP/1.1 200 OK
Date: Fri, 09 Jan 1970 22:53:45 GMT
Server: Document not found
Connection: Close
Content-Type: text/html; charset=utf-8
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Set-Cookie: z9ZAqJtI=93f19ed6000bcdf9; path=/

r="<redacted-patch-is-missing>5r3e4AVzTY+Fkc5aEaga5CRsIC8eOUUux/Al36Ffr7U=,s=4fcb2dd77ee4bc4e1d9066e371c2034d1b55e07d28b9474e692c3f3531992b17,i=4096
-------------------------------------------------------------------------------
This vulnerability can be triggered via GET and POST requests.

Solution
-------------------------------------------------------------------------------
None. A firmware update will be published by Schneider Electric.

Workaround
-------------------------------------------------------------------------------
Restrict network access to management interface.

Recommendation
-------------------------------------------------------------------------------
A full security review is recommended by CyberDanube.


Contact Timeline
-------------------------------------------------------------------------------
2025-03-11: Contacting Schneider Electric PSIRT and sent advisory via PGP.
2025-03-12: Received case tracking number from Schneider Electric PSIRT.
2025-04-10: Asking for an update.
2025-04-14: Vendor confirmed the vulnerability.
2025-05-21: Asking for an update.
2025-05-22: Vendor targets to publish an update on 9th of September. Set
            disclosure date to 2025-09-09.
2025-06-23: Asking for an update; Vendor responded that they will notify us if
            an ealier publication is planned.
2025-09-02: PSIRT informed us that the patch cannot be delivered on 9th of
            September. Re-send advisory to sync about published information.
2025-09-04: Redacted XSS PoC code in the advisory has been redacted upon
            request from PSIRT.
2025-09-09: Coordinated release of security advisory.

Web: https://www.cyberdanube.com
Twitter: https://twitter.com/cyberdanube
Mail: research at cyberdanube dot com

EOF T. Weber / @2025
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • CyberDanube Security Research 20250909-0 | Cross-Site Scripting in Schneider ATV 630 Thomas Weber | CyberDanube via Fulldisclosure (Sep 25)

文章来源: https://seclists.org/fulldisclosure/2025/Sep/69
如有侵权请联系:admin#unsafe.sh