Impact
A flaw in Schneider Electric PowerChute Serial Shutdown allows a Web Administrator to flood the system with POST /helpabout requests, causing uncontrolled resource consumption and excessive troubleshooting zip file creation that can exhaust storage and degrade service. The resulting denial of service impacts availability by rendering the web interface unresponsive or exhausting server resources. The problem reflects the weakness of uncontrolled resource consumption, categorized as CWE-400.
Affected Systems
The vulnerability affects Schneider Electric PowerChute Serial Shutdown. No specific product version information is provided in the advisory. Users should verify the firmware or software version of their PowerChute installation to determine applicability.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate risk. Exploitation requires access to the web admin interface; an attacker would need to authenticate as a Web Administrator or otherwise gain the ability to issue repeated POST /helpabout requests. Because no EPSS score is available and the vulnerability is not listed in the KEV catalog, the likelihood of exploitation is uncertain but the potential impact warrants immediate attention. The attack can be mitigated by applying the available vendor patch, restricting access to the web interface, or implementing traffic rate limiting.
OpenCVE Enrichment