On March 19, 2026, CISA published an Industrial Controls Systems (ICS) advisory (ICSA-26-078-03) for a critical vulnerability in Schneider Electric's EcoStruxure Automation Expert software. The vulnerability, CVE-2026-2273, is a code injection flaw with a CVSS v3 score of 8.2 (High). An authenticated attacker could exploit this by convincing a legitimate user to open a malicious project file. Successful exploitation allows for arbitrary command execution on the engineering workstation, potentially leading to a full system compromise and creating a significant risk for the associated industrial environment. Schneider Electric has released software version 25.0.1 to address the vulnerability.
The vulnerability exists within the project file handling mechanism of the EcoStruxure Automation Expert software. An attacker can craft a malicious project file containing arbitrary commands. When an authenticated user opens this file on their engineering workstation, the embedded commands are executed with the privileges of that user. Since engineering workstations are highly privileged and have direct access to ICS/OT networks, their compromise is a critical security event.
This software is used across multiple critical infrastructure sectors, including Commercial Facilities, Critical Manufacturing, and Energy.
The vulnerability was reported to CISA by Schneider Electric. There is no mention of active exploitation in the wild. The advisory is a proactive measure to encourage asset owners to patch before the flaw can be weaponized.
The compromise of an engineering workstation (EWS) in an ICS environment is a high-impact event. An attacker achieving arbitrary command execution on an EWS could:
T0831 - Manipulation of Control).Successful exploitation could lead to production downtime, equipment damage, or even unsafe operating conditions.
.axp or similar) for suspicious scripts, embedded executables, or other anomalies. Use sandboxing to open untrusted project files to observe their behavior.AutomationExpert.exe process. For example, AutomationExpert.exe spawning powershell.exe or cmd.exe is highly anomalous.Upgrade to the patched version of EcoStruxure Automation Expert (25.0.1 or later).
Mapped D3FEND Techniques:
Train engineers to be cautious of project files from untrusted sources and to verify their authenticity before opening.
Use EDR or application control on engineering workstations to monitor and block suspicious process execution chains.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats