Cyber Posture

CVE-2025-1058

High

Published: 13 February 2025

Published
13 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0012 30.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1058 is a high-severity Download of Code Without Integrity Check (CWE-494) vulnerability in Schneider Electric (inferred from references). Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique System Firmware (T1542.001); ranked at the 30.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-14 (Signed Components) and SI-7 (Software, Firmware, and Information Integrity).

Threat & Defense at a Glance

What attackers do: exploitation maps to System Firmware (T1542.001). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-7 mandates integrity verification tools and techniques for firmware to detect unauthorized modifications, directly addressing the lack of integrity checks during malicious firmware download.

prevent

CM-14 requires digitally signed system components like firmware prior to installation or execution, preventing installation of unsigned or tampered firmware.

prevent

SR-11 enforces verification of component authenticity prior to connection or operation, mitigating risks from unverified firmware downloads in devices.

MITRE ATT&CK Enterprise TechniquesAI

T1542.001 System Firmware Stealth
Adversaries may modify system firmware to persist on systems.
Why these techniques?

Vulnerability enables installation of malicious firmware due to missing integrity checks, directly facilitating System Firmware compromise (T1542.001).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

CWE-494: Download of Code Without Integrity Check vulnerability exists that could render the device inoperable when malicious firmware is downloaded.

Deeper analysisAI

CVE-2025-1058 is a CWE-494: Download of Code Without Integrity Check vulnerability in a Schneider Electric device. The issue arises when firmware is downloaded without proper integrity verification, potentially allowing malicious firmware to be installed. Published on 2025-02-13, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), reflecting high severity primarily from impacts to integrity and availability.

An attacker requires only low privileges (PR:L) to exploit this vulnerability over the network (AV:N) with low attack complexity and no user interaction. Successful exploitation enables the download of malicious firmware, which can render the affected device inoperable, achieving high integrity (I:H) and availability (A:H) impacts with no confidentiality effects.

Schneider Electric has published Security and Safety Notice SEVD-2025-042-01, available at https://download.schneider-electric.com/files?p_Doc_Ref=sevd-2025-042-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-01.pdf, which provides further details on mitigation and remediation.

Details

CWE(s)

Affected Products

Schneider Electric
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2024-50696Shared CWE-494
CVE-2026-27180Shared CWE-494
CVE-2025-57431Shared CWE-494
CVE-2025-27593Shared CWE-494
CVE-2026-40066Shared CWE-494
CVE-2025-56513Shared CWE-494
CVE-2025-69263Shared CWE-494
CVE-2026-3502Shared CWE-494
CVE-2025-7620Shared CWE-494
CVE-2024-43169Shared CWE-494

References