Browse all 60 CVE security advisories affecting Schweitzer Engineering Laboratories. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Schweitzer Engineering Laboratories (SEL) specializes in digital protection relays, automation, and monitoring systems for electrical power grids. With sixty recorded Common Vulnerabilities and Exposures (CVEs), the company’s software ecosystem has historically been susceptible to remote code execution (RCE) and cross-site scripting (XSS) flaws, often stemming from web-based configuration interfaces. Privilege escalation vulnerabilities have also been documented, allowing unauthorized users to gain administrative control over critical infrastructure components. While SEL maintains a robust security posture with regular firmware updates, the nature of its industrial control systems makes it a high-value target for state-sponsored actors and cybercriminals seeking to disrupt energy distribution. Notable incidents include the discovery of hardcoded credentials in older relay models, highlighting the challenges of securing legacy industrial equipment. Despite these risks, SEL continues to implement enhanced encryption and access controls to mitigate threats to global power grid stability.
This page lists every published CVE security advisory associated with Schweitzer Engineering Laboratories. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.