CVE-2025-1060
Published: 13 February 2025
Summary
CVE-2025-1060 is a high-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Schneider Electric (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 36.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-13 (Cryptographic Protection) and SC-8 (Transmission Confidentiality and Integrity).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires cryptographic protection for the confidentiality of transmitted information, preventing exposure of sensitive data to network sniffers exploiting cleartext transmission.
Mandates implementation of cryptographic mechanisms to protect sensitive information confidentiality during transmission, comprehensively addressing the cleartext vulnerability.
Ensures proper establishment and management of cryptographic keys essential for securing transmissions against sniffing attacks.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Cleartext transmission of sensitive information directly enables successful capture of data via network sniffing (T1040) when an adversary performs MITM or passive interception.
NVD Description
CWE-319: Cleartext Transmission of Sensitive Information vulnerability exists that could result in the exposure of data when network traffic is being sniffed by an attacker.
Deeper analysisAI
CVE-2025-1060 is a CWE-319 Cleartext Transmission of Sensitive Information vulnerability that could result in the exposure of data when network traffic is sniffed by an attacker. It affects certain Schneider Electric products, as outlined in their security notice SEVD-2025-042-01. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to network accessibility, low attack complexity, and no requirements for privileges or user interaction.
An attacker with the ability to monitor or sniff network traffic—such as through man-in-the-middle interception on shared networks or compromised infrastructure—can exploit this issue. Successful exploitation allows the attacker to capture sensitive information transmitted in cleartext, achieving high-impact confidentiality violations without affecting integrity or availability.
For mitigation details, refer to the official Schneider Electric advisory at https://download.schneider-electric.com/files?p_Doc_Ref=sevd-2025-042-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-01.pdf, which was published alongside the CVE on 2025-02-13.
Details
- CWE(s)