Description
CWE-1284 Improper Validation of Specified Quantity in Input vulnerability exists that could cause Event and Data Log truncation impacting log integrity when a Web Admin user alters the POST /logsettings request payload.
Published: 2026-04-14
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Log Integrity Loss
Action: Patch
AI Analysis

Impact

An improper input validation flaw in Schneider Electric PowerChute Serial Shutdown allows a Web Administrator to supply a malformed payload to the /logsettings endpoint, causing the event and data logs to be truncated and thereby compromising log integrity. This flaw is categorized as CWE-1284, reflecting a failure to enforce proper quantity limits during input processing. The loss of log integrity can hinder forensic investigations, impede audit processes, and mask malicious or accidental activity performed on the affected system.

Affected Systems

Schneider Electric PowerChute Serial Shutdown is the affected product. No specific versioning information is provided in the advisory, so all current releases that expose the /logsettings endpoint should be considered potentially vulnerable.

Risk and Exploitability

The CVSS score of 5.3 places this vulnerability in the moderate range. Exploitation requires authenticated access to the Web Admin interface and the ability to issue a POST request to /logsettings, which suggests that the attack vector is management‑console based, either remote or local. The EPSS score is unavailable, and the vulnerability is not listed in the CISA KEV catalog, indicating that publicly known exploitation has not yet been demonstrated. Nevertheless, an attacker who can gain administrative privileges could truncate logs to conceal their actions, creating a significant integrity risk for compliance and security monitoring.

Generated by OpenCVE AI on April 14, 2026 at 16:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Schneider Electric website or vendor portal for an official patch or firmware update for PowerChute Serial Shutdown.
  • If a patch is not yet available, restrict or disable access to the Web Admin /logsettings interface for untrusted users or disable the feature entirely.
  • Enable external or off‑site logging to preserve an untampered copy of the logs for forensic purposes.
  • Continuously monitor event and data log files for unexpected truncation events or anomalies.

Generated by OpenCVE AI on April 14, 2026 at 16:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Schneider-electric
Schneider-electric powerchute Serial Shutdown
Vendors & Products Schneider-electric
Schneider-electric powerchute Serial Shutdown

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Log Truncation via Improper Input Validation in Schneider Electric PowerChute Serial Shutdown Web Admin

Tue, 14 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Description CWE-1284 Improper Validation of Specified Quantity in Input vulnerability exists that could cause Event and Data Log truncation impacting log integrity when a Web Admin user alters the POST /logsettings request payload.
Weaknesses CWE-1284
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Schneider-electric Powerchute Serial Shutdown
cve-icon MITRE

Status: PUBLISHED

Assigner: schneider

Published:

Updated: 2026-04-14T16:27:27.629Z

Reserved: 2026-02-12T13:19:02.490Z

Link: CVE-2026-2403

cve-icon Vulnrichment

Updated: 2026-04-14T16:23:57.462Z

cve-icon NVD

Status : Received

Published: 2026-04-14T16:16:38.913

Modified: 2026-04-14T16:16:38.913

Link: CVE-2026-2403

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:41:09Z

Weaknesses