PatchSiren cyber security CVE debrief
CVE-2025-46819 Schneider Electric CVE debrief
CVE-2025-46819 is a Schneider Electric ProLeiT Plant iT/Brewmaxx issue scored CVSS 3.1 6.3 (Medium). CISA and Schneider Electric say Patch ProLeiT-2025-001 reduces risk by disabling Redis eval commands in key components and by enforcing secure Redis configuration templates. Because the weakness is locally accessible and can affect confidentiality and availability, affected OT deployments should patch promptly.
- Vendor
- Schneider Electric
- Product
- ProLeiT
- CVSS
- MEDIUM 6.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-01-13
- Original CVE updated
- 2026-03-24
- Advisory published
- 2026-01-13
- Advisory updated
- 2026-03-24
Who should care
Operators and administrators of Schneider Electric ProLeiT Plant iT/Brewmaxx environments, especially sites running Application Server, VisuHub, Engineering Workstations, or the emergency-mode workstation. OT security teams responsible for patching and configuration control should also prioritize review.
Technical summary
The advisory maps CVE-2025-46819 to Schneider Electric ProLeiT Plant iT/Brewmaxx version 9.60 and related affected deployments. The documented remediation focuses on reducing risk from Redis by disabling eval commands, forcing secure Redis configuration templates, and restarting patched servers and workstations. The supplied CVSS vector (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H) indicates a local, low-privilege condition with high confidentiality and availability impact.
Defensive priority
Medium overall; prioritize quickly in OT environments because the impact can be significant and the fix is already available.
Recommended defensive actions
- Install Patch ProLeiT-2025-001 from Schneider Electric Support for affected ProLeiT Plant iT/Brewmaxx systems.
- Apply the patch guidance to disable Redis eval commands on Application Server, VisuHub, Engineering Workstations, and workstations with emergency mode functionality.
- Force the use of secure Redis configuration templates in system settings as documented in the patch manual.
- Restart all patched servers and workstations after remediation.
- Verify that affected ProLeiT components are running patched configurations and that the patch is present across the environment.
Evidence notes
Source timing is based on the supplied CVE and advisory dates: published 2026-01-13 and modified 2026-03-24. The CISA CSAF revision history shows an initial release, a 2026-03-10 update to the CWE description, and a 2026-03-24 republication of Schneider Electric CPCERT SEVD-2026-013-01. The remediation text explicitly names the Redis eval-command change, secure template enforcement, affected component types, and the required restart.
Official resources
-
CVE-2025-46819 CVE record
CVE.org
-
CVE-2025-46819 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Published by CISA on 2026-01-13 and republished on 2026-03-24 from Schneider Electric CPCERT SEVD-2026-013-01; the source revision history also records a CWE description update on 2026-03-10.