PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-46819 Schneider Electric CVE debrief

CVE-2025-46819 is a Schneider Electric ProLeiT Plant iT/Brewmaxx issue scored CVSS 3.1 6.3 (Medium). CISA and Schneider Electric say Patch ProLeiT-2025-001 reduces risk by disabling Redis eval commands in key components and by enforcing secure Redis configuration templates. Because the weakness is locally accessible and can affect confidentiality and availability, affected OT deployments should patch promptly.

Vendor
Schneider Electric
Product
ProLeiT
CVSS
MEDIUM 6.3
CISA KEV
Not listed in stored evidence
Original CVE published
2026-01-13
Original CVE updated
2026-03-24
Advisory published
2026-01-13
Advisory updated
2026-03-24

Who should care

Operators and administrators of Schneider Electric ProLeiT Plant iT/Brewmaxx environments, especially sites running Application Server, VisuHub, Engineering Workstations, or the emergency-mode workstation. OT security teams responsible for patching and configuration control should also prioritize review.

Technical summary

The advisory maps CVE-2025-46819 to Schneider Electric ProLeiT Plant iT/Brewmaxx version 9.60 and related affected deployments. The documented remediation focuses on reducing risk from Redis by disabling eval commands, forcing secure Redis configuration templates, and restarting patched servers and workstations. The supplied CVSS vector (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H) indicates a local, low-privilege condition with high confidentiality and availability impact.

Defensive priority

Medium overall; prioritize quickly in OT environments because the impact can be significant and the fix is already available.

Recommended defensive actions

  • Install Patch ProLeiT-2025-001 from Schneider Electric Support for affected ProLeiT Plant iT/Brewmaxx systems.
  • Apply the patch guidance to disable Redis eval commands on Application Server, VisuHub, Engineering Workstations, and workstations with emergency mode functionality.
  • Force the use of secure Redis configuration templates in system settings as documented in the patch manual.
  • Restart all patched servers and workstations after remediation.
  • Verify that affected ProLeiT components are running patched configurations and that the patch is present across the environment.

Evidence notes

Source timing is based on the supplied CVE and advisory dates: published 2026-01-13 and modified 2026-03-24. The CISA CSAF revision history shows an initial release, a 2026-03-10 update to the CWE description, and a 2026-03-24 republication of Schneider Electric CPCERT SEVD-2026-013-01. The remediation text explicitly names the Redis eval-command change, secure template enforcement, affected component types, and the required restart.

Official resources

Published by CISA on 2026-01-13 and republished on 2026-03-24 from Schneider Electric CPCERT SEVD-2026-013-01; the source revision history also records a CWE description update on 2026-03-10.