PatchSiren cyber security CVE debrief
CVE-2025-11739 Schneider Electric CVE debrief
CVE-2025-11739 is a high-severity unsafe deserialization issue in Schneider Electric EcoStruxure Power Monitoring Expert (PME) and related EcoStruxure Power Operation (EPO) reporting/dashboard components. A locally authenticated attacker who can send a crafted data stream may trigger arbitrary code execution with administrative privileges. The advisory was published on 2026-03-10 and republished by CISA on 2026-03-19.
- Vendor
- Schneider Electric
- Product
- EcoStruxure Power Monitoring Expert (PME) 2022
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-03-10
- Original CVE updated
- 2026-03-19
- Advisory published
- 2026-03-10
- Advisory updated
- 2026-03-19
Who should care
OT/ICS defenders, Windows and application administrators, and operators running EcoStruxure PME or EPO—especially environments with shared local access, elevated accounts, or older end-of-life deployments such as PME 2022 and EPO 2022.
Technical summary
The vulnerability is described as a deserialization of untrusted data / unsafe deserialization flaw. With local authentication and low privileges, an attacker may supply a crafted data stream that the application processes unsafely, potentially resulting in arbitrary code execution as an administrator. The source advisory associates the issue with PME releases through 2024 R2 and EPO advanced reporting/dashboard modules, and it lists vendor hotfixes for 2023R2 and 2024R2 plus an upgrade path to PME 2024 R3. The advisory text reports CVSS v4.0 Base Score 8.5 (High).
Defensive priority
High. Prioritize remediation on any PME/EPO deployment where local users or shared administrator access exist, because the flaw can escalate to administrative code execution.
Recommended defensive actions
- Apply Schneider Electric hotfix Hotfix_279338_Release_2024R2 for EcoStruxure PME 2024R2 where applicable; Schneider states no reboot is required.
- Apply Schneider Electric Hotfix_282807 for EcoStruxure PME 2023R2 where applicable; Schneider states no reboot is required.
- Upgrade to EcoStruxure Power Monitoring Expert (PME) 2024 R3, which Schneider lists as the preferred remediation path.
- For PME 2022 and EPO 2022 end-of-life deployments with no vendor fix planned, isolate the system, restrict network access with Windows Firewall, and limit access to essential users only.
- Audit Windows-authenticated and elevated accounts that can reach PME/EPO, revoke unnecessary access, and enforce least privilege and strong password policies.
- Follow Schneider Electric’s cybersecurity hardening guidance for PME, including isolated-network placement and periodic permission reviews.
Evidence notes
The supplied source corpus ties this CVE to Schneider Electric advisory SEVD-2026-069-06 and CISA advisory ICSA-26-078-04, both published on 2026-03-10, with a CISA republication on 2026-03-19. The advisory text states that a locally authenticated attacker can trigger unsafe deserialization and potentially achieve arbitrary code execution with administrative privileges. Remediation entries name hotfixes for 2023R2 and 2024R2, the PME 2024 R3 upgrade path, and no-fix-planned guidance for end-of-life 2022 products. The source data includes a CVSS v4.0 8.5/High statement and also carries a CVSS 3.1 vector field in metadata.
Official resources
-
CVE-2025-11739 CVE record
CVE.org
-
CVE-2025-11739 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed on 2026-03-10; the source record was republished/updated by CISA on 2026-03-19. No KEV listing is present in the supplied record.