Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:schneider-electric:powerchute_serial_shutdown:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 14 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Sensitive Information Exposure via Log Injection in PowerChute Serial Shutdown |
Tue, 14 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Schneider-electric
Schneider-electric powerchute Serial Shutdown |
|
| Vendors & Products |
Schneider-electric
Schneider-electric powerchute Serial Shutdown |
Tue, 14 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CWE-532 Insertion of Sensitive Information into Log File vulnerability exists that could cause confidential information to be exposed when a Web Admin user executes a malicious file provided by an attacker. | |
| Weaknesses | CWE-532 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: schneider
Published:
Updated: 2026-04-14T16:27:16.331Z
Reserved: 2026-02-12T13:18:59.627Z
Link: CVE-2026-2401
Updated: 2026-04-14T16:23:21.395Z
Status : Analyzed
Published: 2026-04-14T16:16:38.623
Modified: 2026-04-22T14:11:41.160
Link: CVE-2026-2401
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:30:16Z